I
I
Henry C. Lucas, Jr. Leonard N. Stern School of Business New York University
_Irwin _ McGraw-Hili Boston
Burr Ridge, IL Dubuque, IA Madison, WI New York San Francisco St. Louis Bangkok Bogota Caracas Lisbon London Madrid Mexico City Milan New Delhi Seoul Singapore Sydney Taipei Toronto
McGraw-Hill Higher Education � A Division of The McGraw-Hill Companies
INFORMATION TECHNOLOGY FOR MANAGEMENT Copyright © 2000, 1997, 1994, 1990, 1986, 1982, 1978 by The McGraw-Hill Companies, Inc. All rights reserved. Printed in the United States of America. Except as permitted under the United States Copyright Act of 1976, no part of this publication may be reproduced or distributed in any form or by any means, or stored in a data base or retrieval system, without the prior written permission of the publisher.
*
This book is printed on acid-free paper.
domestic international
1 2 3 4 5 6 7 8 9 0 FGRlFGR 9 0 9 8 7 6 5 4 3 2 1 0 9 1 2 3 4 5 6 7 8 9 0 FGRlFGR 9 0 9 8 7 6 5 4 3 2 1 0 9
ISBN 0-07-229763-8 Vice presidentJEditor-in-Chief: Michael W. Junior Publisher: David Kendric Brake Senior sponsoring editor: Rick Williamson Editorial coordinator: Carrie Berkshire-Peters Senior marketing manager: Jodi McPherson Project manager: Christine A. Vaughan Senior production supervisor: Lori Koetters Freelance design coordinator: JoAnne Schopler Supplement coordinator: Rose M. Range Compositor: Shepherd, Inc. Typeface: 1 0//2 Times Roman Printer: Quebecor Printing Book Group/Fairfield Cover Photograph: © John Still/Photonica
Library of Congress Cataloging-in-Publication Data Lucas, Henry C. Information technology for management / Henry C. Lucas, Jr. -7th ed. cm. p. ISBN 0-07-229763-8 1. Management information systems. 2. Information technology Management. 1. Title. T58.6.L815 2000 658.4'038'011-dc21 INTERNATIONAL EDITION ISBN 0-07-116967-9 Copyright © 2000. Exclusive rights by The McGraw-Hill Companies, Inc. for manufacture and export. This book cannot be re-exported from the country to which it is consigned by McGraw-Hill. The International Edition is not available in North America. http://www.rnhhe.com
99-14924
To Scott and Jonathan
TO THE STUDENT
Information technology surrounds you-on your campus and in local businesses. When you order merchandise over the telephone, chances are your sales represen tative is using an information system to check inventory and to trigger the ship ment of your goods. Increasingly you will order products using the Internet, dis pensing with the telephone and becoming a participant in electronic commerce. When you use an automatic teller machine, make an airline reservation, or rent a car, information technology (IT) is working for you again. Information technology is pervasive in modem organizations-from the largest manufacturing firms to your comer drugstore, and the stakes are high, as busi nesses confronted with global competition strive to succeed. Some organizations will flourish; others will fail. Those that succeed will understand how to use and manage information technology to their advantage. The purpose of Information Technology for Management, Seventh Edition, is to help you learn enough about technology to play an active role in managing infor mation technology. It is important to understand the strategic uses of IT and how to apply technology when developing a corporate strategy. You will see how cre ative organizations have integrated technology with strategy, allowing them to gain and sustain a competitive advantage. What role does the Internet play for your firm? What are the advantages your business can obtain from implementing In tranets and Extranets? How does technology facilitate the operations of global firms? v
vi
PREFACE
You will also see how to use information technology to transform the organiza tion and to create new lines of business and new relationships with other firms. The text stresses how you as a manager can use information technology-enabled organi zational design variables to create new organizational structures, including the T-Form firm. This new structure takes advantage of electronic communications and linking, technological matrixing, technological leveling, virtual components, elec tronic workflows, production automation, and electronic customer-supplier relation ships to create a flat organization closely linked to other organizations. It uses tech nology to reduce the number of administrative levels, to decentralize decision making, and generally to design a highly efficient and effective organization. You will learn how to exploit technology to enhance your professional and per sonal productivity. Information technology is a resource. It enables you to re design the organization, change the firm's relationship with customers and suppli ers, as well as its communications patterns. Technology is a variable that you as a manager will be able to manipulate to effect significant improvements in what the organization and its employees can accomplish. A theme throughout the book is that information technology brings change to organizations, individuals, work groups, relationships among companies, and even national governments. Information technology provides the manager with a pow erful resource for bringing about change. Once you have completed your course, look through a newspaper or business publication. You will be surprised at your understanding of many of the issues raised in articles dealing with information technology. In sum, this text is designed to prepare you for the important role of managing information technology, to give you and your company a competitive edge. TO THE INSTRUCTOR
This book is designed for business students with no particular background in in formation systems. Its primary goal is to help prepare students to assume an active and significant role in the management, design, and use of information technology. This edition stresses the changes enabled by IT. Each chapter begins with a short Focus on Change because technology is creating dramatic changes in the way in dividuals, work groups, organizations, and even governments function. The Objectives of This Text
During the past decade, computers and communications technologies have prolif erated in offices and homes. Organizations distribute the responsibility for tech nology to all levels of management and to different geographic locations. As a re sult, managers from supervisor to CEO encounter information technology on a daily basis. Every day managers make decisions that determine how much value the firm obtains from its investment in technology. Organizations have the opportunity to become more efficient and competitive. Skilled and creative managers are required to accomplish these goals. Today's MBAs need the knowledge and confidence to deal with issues related to technology.
PREFACE
They must apply technology aggressively if they are to compete successfully in our global economy. They must take advantage of the ability that IT gives them to change the way work is done, communications patterns, and the very structure of the organization. One of the most important parts of using the technology is the design of informa tion systems. Much of the distribution of technology to users results from the rapid diffusion of personal computers or workstations. Applications once considered per sonal are being shared across networks. Knowledge workers access a number of dif ferent applications on different computers through a LAN and the Internet. Knowledge workers may design systems for themselves alone, or they may be one of many users of a system designed by others. The design of multiuser appli cations is much more complex than the design of a personal computer system for an individual user. Many more people are involved in the process, each with unique and often conflicting needs and expectations. Recent graduates are likely to find themselves on design teams for multiuser systems. Thus, it is critical that a course in information systems prepare students to play an active role in the development of new applications that will affect their productivity and their company's competitiveness. Based on the discussion above, this book is designed to help students meet these three major objectives: 1. To understand the emerging technological issues facing management so stu dents can effectively manage information systems in organizations 2. To play an active role in applying technology through the analysis, design, and implementation of multiuser systems that will meet the information needs of the organization 3. To learn how to use technology to transform the organization and create new relationships, structures, and entirely new organizations ORGANIZATION
The text is organized into six major parts to help students meet these objectives: Part One The Role of Managers in Information Technology
The purpose of Part One is to emphasize to students the value of information as a corporate asset and illustrate the myriad information systems applications they will face as graduates. Frameworks help them understand the role of technology in business. Part Two
Organizational Issues
In Part Two we deal with the impact of information technology on the organiza tion. The book stresses the use of IT design variables in creating new kinds of or ganization structures. In particular, I advocate developing T-Form organizations in order to be successful in the highly competitive environment of the twenty-first century. This section also discusses how the firm can use technology as part of its
vii
viii
PREFACE
strategy to gain a competitive advantage. This discussion of key managerial issues surrounding the technology and its application helps motivate student learning. Part Three
Information Technology
Important managerial decisions increasingly require an understanding of the tech nology. Therefore, graduates need to have knowledge of hardware and software fundamentals. In Part Three I have included the technical information I consider most important and relevant to future managers. Part Four Systems Analysis and Design
Poorly designed systems are responsible for many information system problems. When information needs are not met, users are alienated and the value of the sys tem diminishes. Part Four prepares graduates to participate in the development of multiuser systems and make an immediate contribution to their employer. Part Five
Exciting Directions in Systems
Part Five deals with alternatives to traditional transactions processing applications such as decision-support systems, expert systems, groupware, multimedia, and ar tificial intelligence. An understanding of these emerging applications offers stu dents great potential to enhance their organizations' competitiveness. Part Six
Issues for Senior Management
At the end of the text, we return to the issues facing management currently. Man agers need to be concerned with security and control, and how to achieve the max imum benefits possible for the firm's investment in technology. Part Six encour ages students to evaluate the problems-and opportunities-that changing societal conditions and technological advances will create for their businesses. The table below arrays our three objectives against the six major parts of the text.
Part
One Two Three Four Five Six
The role of managers in IT Organizational issues I nformation technology Systems analysis and design EXCiting directions in systems Management control of IS
Managing technology
Applying technology
Transform the organization
[Xl [Xl [Xl [Xl [Xl [Xl
[ 1 [Xl [Xl [Xl [Xl [ 1
[Xl [Xl [ 1 [Xl [Xl [ 1
Note that the first objective-managing information technology-is a theme woven throughout every chapter. To manage technology effectively, students must understand its strategic significance and potential impact on the organization. In addition to these underlying organizational issues, managers must understand the related technical issues. The second objective-learning to apply technology through a systems analy sis and design team-is supported by Parts Two, Three, Four, and Five. These
PREFACE
parts cover the fundamentals of systems development from a managerial perspec tive. Using the Simon Marshall case, which is found throughout the book, stu dents complete the logical design of a system. This exercise encourages students to confront the myriad decisions and trade-offs that constitute the design of a multiuser system and gain a "real world" understanding of what otherwise would remain abstract. The third and final objective-transforming the organization-is a theme throughout the text. It is a significant component of Parts One, Two, Four, and Five. In one sense, the entire text is devoted to preparing students to use technol ogy to change the way organizations are structured and operate. Learning Tools for Your Students
The text has a number of features designed to facilitate student learning, including the following: Management Problems and topical vignettes Most chapters contain Man agement Problems and topical vignettes. Management Problems are "mini cases" for students to ponder alone or in groups; some instructors use the problems to stimulate class discussion. The vignettes illustrate the many dif ferent ways that information technology is used. They are intended to help the student become more creative in discovering how to benefit from information systems. • Chapter Summary A summary of each chapter in the form of a numbered list containing the most important points in the chapter is found at the end of each chapter. • Implications for Management Another feature is a paragraph after the Chapter Summary that contains my thoughts on the implications of the chapter material for a manager. This personal statement explains the importance of the material the student has just read. • Chapter Projects Most chapters contain a Chapter Project. The projects are de signed to help students apply concepts discussed in the chapter. Some projects require the student to conduct research or contact an organization to find out more about its information processing. I usually use one of the systems design projects as a group assignment. Students report that the experience of designing the logic of a system helps pull together much of the material in the course. • The Simon Marshall case Several of the chapter projects involve the Simon Marshall case. There is a systems analysis and design problem for Simon Mar shall that involves PCs, a server, a local area network, a mainframe data source, and a satellite distribution system. This assignment, carried out as a group proj ect, helps students master the technical and design material in the text. •
Instructor's Manual
The Instructor's Manual contains a course outline, teaching hints, and answers to selected questions. Also included are a discussion of all the Management Prob lems and sample course syllabi.
ix
X
PREFACE
OVERVIEW OF THE SEVENTH EDITION
The seventh edition of Information Technology for Management reflects current thinking about the role of IT in management. In particular, it stresses the fact that managers implement new technology to change something: the organization, the nature of work, relationships with other organizations, or some other facet of busi ness. The student should look at IT as a resource that he or she can employ to make major improvements in the organization. Compared with the previous edition, the seventh edition contains less emphasis on the technical details and more on the managerial issues of IT and state-of-the art topics. The tremendous growth of the Internet and Web has had a major influ ence on the text. Material on the value of information technology and how man agement should decide on IT investments is greatly expanded. There are also many new topical vignettes in each chapter. Over the years, we have seen major changes in the way leading firms use infor mation technology. Transactions processing systems helped improve efficiencies. Strategic systems provide some companies with a competitive advantage. Now, with workgroup technology, group DSS, and extensive connectivity, we have the ability to use IT to transform the organization. This theme of change is reflected throughout this current edition. The text has been extensively updated to reflect advances in technology and in its application. There are many more examples of applications and systems in the text to supplement the topical vignettes that are ruled off in the text. The first chapter sets the stage for the text and attempts to motivate students to study information technology. The next two chapters discuss the nature of infor mation and frameworks for IT. Frameworks help students understand the role of technology in the firm. Chapter 4 is extremely important; it discusses the impact of information tech nology on the organization. Consistent with the theme of change, the chapter pre sents examples of how technology has dramatically changed organizations. It also presents an approach to actively using technology in the design of new organiza tional forms. Chapter 5 on the strategic use of IT stresses the difficulty of sustain ing an advantage once it is achieved. This chapter also contains a lengthy descrip tion of a firm that has used the technology over the years to develop a clear competitive advantage. The section on the issues in managing information tech nology is now clearer and more streamlined. Globalization is now a major trend in business. Trade barriers are falling, and firms are expanding their markets beyond their own borders. Chapter 6 explores the implications of globalization for information technology. What can IT con tribute to the international firm? What are the special IT problems created by try ing to operate globally? Part Three of the text is devoted to information technology; it attempts to pro vide the student with sufficient familiarity with technology so that he or she can make good management decisions. Chapter 8 places the different types of computers available today in perspective. It discusses the different generations of Intel chips and the features that are used to
PREFACE
increase the speed of these processors. I have attempted to provide a balanced and realistic picture of the role and future of mainframes, both in this chapter and throughout the text Chapter 9 contains a discussion of the major operating sys tems choices today: Windows 98, Unix, and Windows NT. Chapter 10 presents the fundamentals of database management and describes how the organization uses a DBMS for transactions processing and to extract in formation to be used in managing the firm. The chapter also stresses how the stu dent can use a DBMS for his or her own personal productivity. Chapter l I on communications emphasizes the role of this technology in trans forming organizations. The chapter features more material on networks and connec tivity along with examples of how firms are using communications technology in creative ways. Chapter 12 on networks covers topics ranging from EDI to the Inter net Networks are one of the fastest growing phenomena in the field, and this chapter tries to excite the reader about their potential. Chapter 12 contains much new mate rial on electronic commerce and the new models of business that IT enables. There is a great deal of confusion about what kind of architecture is best for a given application or organization. Chapter 13 attempts to clarify any confusion the student may have about people who use the different types of technology de scribed in earlier chapters. This chapter discusses the role of large, medium, and small computers and illustrates them with examples of different systems, ranging from a centralized, mainframe airline reservations system to a highly decentral ized, client-server system at Chevron Canada. New to this edition is a discussion of Travelocity, a Web site that allows a user with a browser to connect to an exist ing mainframe reservations system. A key objective of the text is to prepare students to apply technology through participation in systems analysis and design projects. We have encountered users who developed their own systems on PCs that served as the specifications for the same system to be developed for the entire corporation! The manager who under stands how to build systems is at a distinct advantage. Chapter 15 introduces systems analysis and design while Chapter 16 covers some design details. One of the highlights of this section is the appendix to the chapter. This appendix presents a high-level design for a system for the Hardserve company. There are complete DFDs for the retail store component of the system and for the subsystem in the company's warehouse. This in-depth example should provide students with a good understanding of the output of the design process and the way in which one describes a system. A second example of object-oriented de sign for a hypothetical community hospital is also in an appendix to this chapter. Chapter 17 talks about enhancements to the traditional life-cycle approach to developing a system, especially packages and prototyping. Chapter 1 8 is devoted to the popular topic of business process reengineering. This chapter presents two examples of process reengineering and two examples where IT design variables have been used to reengineer the entire organization. Implementation is concerned with how you bring about change in the organi zation. You are trying to see, at the level of the individual system, that systems provide the maximum return from the firm's investment in IT. In using IT design
xi
xii
PREFACE
variables, you are likely to be trying to change the structure of the entire organi zation, a major challenge. Chapter 19 is devoted to implementation; it is still true that systems are underutilized and that users take advantage of only a fraction of the capabilities of existing, installed technology. Chapter 19 integrates research findings to produce an implementation framework to help the student understand and manage this process. When the first edition of this text was published, there were no hands-on users outside of the IS department. We have moved from no contact to terminals to workstations on the user's desk. Chapter 20 discusses the range of knowledge worker interaction with technology and suggests ways to encourage it. The evolv ing model of client-server computing means that users on workstations will obtain the data and programs they need to answer their questions from the server. Chapter 21 describes how IT can be used in nontraditional ways to enhance the effectiveness of individuals and organizations. The DSS part of the chapter con tains examples of how these applications contribute to improving productivity. Material on EIS and group DSS is also found in the chapter. Groupware is one of the most exciting applications for transforming organizations and is discussed in this chapter. A section on multimedia stresses how this technology can be used for business, as opposed to entertainment, purposes. Chapter 22 on intelligent systems contains an in-depth example of an expert system we developed at the American Stock Exchange. There is also material on neural networks and coverage of case-based reasoning and genetic algorithms. Part Six deals with management issues. Chapter 24 includes a discussion of several different models of IT in the firm and an in-depth discussion of the role of the CIG. It also contains guidelines or steps for diagnosing and improving the IT effort in an organization. New to this chapter is an extensive discussion of how the firm can make decisions about investing in information technology, including cov erage of the IT Value Equation and the IT Investment Equation. Chapter 25 pre sents framework for categorizing social issues and a discussion of ethics. It also includes a discussion about living with future technology. CONCLUSION
This seventh edition of the text is intended to help your students appreciate the contribution of information technology and learn how to manage it.
I am indebted to a number of students and colleagues whose comments and rec ommendations have greatly influenced the original text and its revisions. Mr. Won seok Oh at NYU helped conduct research for the book; I am grateful for his ef forts. The following reviewers have helped in making the major changes found in this edition of the text: Mark Frolick, the University of Memphis; James L. Haner, City University; Lorin M. Hitt, the University of Pennsylvania; and A. B. Schwarzkopf, the Univer sity of Oklahoma. I would like to thank the following people at IrwinlMcGraw-Hill who worked very hard to design and produce this text: Rick Williamson, Carrie Peters, Chris tine Vaughan, and JoAnne Schopler. Finally, I gratefully acknowledge the invaluable support of my wife, Ellen, and family, who encourage and tolerate the idiosyncrasies of an author. Henry C. Lucas, Jr. New York University
xiii
Preface Acknowledgments
v
xiii
The Challenge of Change
16
Six Major Trends
17
A Preview of the Book
19
2. INTERPRETING AND UNDERSTANDING INFORMATION
PART ONE
The Nature of Information What Is Information?
How People Interpret Information 1. USING TECHNOLOGY TO TRANSFORM THE ORGANIZATION
The Senior Manager Information Technology in the Workplace
A Model for Interpreting Information Characteristics of Information 5 6 6
A Visit to Brun Pas sot in France
10
What Is Information Technology?
11
Transforming Organizations Information Technology and the Manager
13 15
From Information to Knowledge The Decision-Making Process Problem Finding and Solving Types of Decisions
How Do Individuals Make Decisions? Stages in the Decision-Making Process
25 26 26 26 28 30 31 34 34 34 35 35
The Influence of the Organization
38
A Scenario for the Not-Too-Distant Future
39
xv
xvi
CONTENTS
3. INFORMATION TECHNOLOGY IN PERSPECTIVE
Frameworks for Information Technology Decision-Oriented Frameworks A Synthesized Framework Adding Organizations and Decisions to a Framework
A Framework Based on IT Changing Technology and Applications Processing Transactions Decision Support, Executive IS, and Expert Systems Knowledge Work Support Supporting Groups and Cooperative Work-Groupware Interorganizational Systems Key Technologies: Communications, Networking, and Database A More Contemporary Framework
The Basics of Information Systems Some Generic Types of Systems Using Diff
Is There Value in IT? Investment Opportunities Matrix What Is Value?
The Case of Chrysler
46 47 47 48
Creating New Types of Organizations
49
Building a T-Form Organization
51 51 51 52 52 52 53 53 53 55 55 55 57 58 65 66
PART TWO
4. THE IMPACT OF INFORMATION TECHNOLOGY ON THE ORGANIZATION
Modern Organizations Organizational Structure and Design What Is Organizational Flexibility? Impact on Flexibility Information Technology Runs the Airline Co-opting the Travel Agent
Technology Transforms the Securities Industry Natural Growth Generates an Impact Conclusions
75 76 76 78 79 79 81
Examples ofDesigns Using IT Variables Adding People to the Design People in the T-Form Other Design Possibilities Adopting the T-Form: An Example
5. STRATEGIC ISSUES OF INFORMATION TECHNOLOGY
Information Technology and Corporate Strategy Some Examples of Technology and Strategy The Value Chain Some Generic Strategies A Frameworkfor the Strategic Use of IT Capitalizing on Information Technology
Creating and Sustaining a Competitive Edge Using Resources to Advantage Protecting an IT Innovation An Example of Technology for Competitive Advantage
82 83 83 84 86 91 94 94 94 96 104 105 106 107 108 109 111 112 112 113 114
Integrating Technology with the Business Environment
116
Managing Information Technology
118
A Vision of the Organization and Technology Technology for Structuring the Organization Integrating Technology and Decision Making A Corporate Plan for Strategy Alliances and Partnerships
119 119 120 120 121
CONTENTS
New IT Initiatives The IT Infrastructure Ongoing Management of IT
122 122 123
6. INTERNATIONAL BUSINESS AND INFORMATION TECHNOLOGY 127
The Impact of Globalization on Business International Business Strategies Multinational Global International Transnational
Key Issues in an International Environment Information Needs Implementing International IT
Managing Information Technology Internationally Concentrate on Interorganizational Linkages Establish Global Systems Development Skills Build an Infrastructure Take Advantage of Liberalized Electronic Communications Strive for Uniform Data Develop Guidelines for Shared versus Local Systems
Three Examples Standard Pharmaceuticals International Asea Brown Boveri VeriFone
128 129 130 130 130 130 130 130 131 134 135 135 135 136 136 137 138 138 139 140
Transnational Virtual Firms and IT
144
Business Models and IT Management
145 145 146 147 147
Independent Operations Headquarters Driven Intellectual Synergy Integrated Global IT
The Internet, Imperialism, and Developing Countries
PART THREE
7. THE FUNDAMENTALS
The Components of a Personal Computer Primary Memory or RAM The Arithmetic Basis of Computers How Memory Is Organized Memory Technology The Central Processing Unit Doing Arithmetic How Does the CPU Work? An Instruction Set
157 158 160 160 162 163 164 165 165 167
CISC versus RISC
167
What Makes a Chip Perform?
169 171 172 173 176 177
What Techniques Increase Speed? Input and Output Input-Only Devices Output Devices Reducing a Bottleneck
8. A PROLIFERATION OF COMPUTERS
182
Implications for Managers
183
The Computers of Today
183 184 187 188
The Rise of the Mainframe Powerful Supercomputers Minis: The Beginning of the Revolution The Personal Computer Has Changed Everything The Server The Network PC versus the Under $IOOOPC Massively Parallel Computers A Personal Assistant Conclusions Why So Many Types of Computers?
9. SOFTWARE IS THE KEY 149
xvii
Managerial Concerns Programming Languages
188 189 189 190 190 191 192 196 197 198
xviii
CONTENTS
The Contribution of Higher-Level Languages An Example of a Special-Purpose Language Fourth-Generation Languages Ease Programming Package Programs Are Another Alternative The Web Browser and Internet Standards The Operating System Early Systems The Next Steps Evolutionary Advances Operating Systemsfor Personal Computers
10. DATABASE MANAGEMENT
File Elements Data Direct-Access Files Storage Media Finding Data on the File More Complex Access
200 210 210 212 214 215 215 219 220 221 228 229 229 230 230 232 232
Enter Database Management Software 234 Benefits of the Relational Model An Example Normalization Object-Oriented Databases
Databases in Systems Design Data Modeling The Role of the Database Administrator DBMSs in Building Systems Oracle: An Enterprise DBMS Distributed Databases The Data Warehouse Data Mining Changing Database Markets
11. COMMUNICATIONS
Communications between Computers Codes Transmission Modes
235 236 238 240 241 241 244 244 245 246 246 249 250 258 260 260 261
Direction of Transmission How Are Signals Represented? Speed of Transmission What Is a Protocol? Summary
Networks
261 262 264 265 266
Network Configurations Local Area Networks TCPIIP: A Network Protocol Going Wireless Voice Considerations
266 268 269 271 272 274
The Advantages of Networks for Business
274
What Are the Alternatives for Wide Area Communications? Why Develop Private Networks? Worries about Network Security
275 279 280
The Contribution of Communications
281
Electronic Mail As a Communications Tool Electronic Data Interchange Beyond the Model T Building an Electronic Market
281 282 283 285
Transforming Organizations and the Economy
285
12. NETWORKS AND ELECTRONIC COMMERCE
294
The Impact of Communications Technology
296
Building Networks Commercial Network Providers
A National Network Infrastructure: The Minitel System Internet: A Case of Phenomenal Growth Intranets and Extranets
The Potential of Electronic Commerce The Nature ofMarkets New Business Models
296 298 299 302 309 311 315 321
CONTENTS
13. INFORMATION TECHNOLOGY ARCHITECTURES
What Is Hardware and Software Architecture? Mainframes for High Volume The Midrange Computer Is (Usually) Smaller The PC Is Totally Different How Do You Share? Power to the Desktop with a Friendly Interface Moving toward the Client-Server Model What Is Infrastructure? The Advantages and Disadvantages of Standards
Examples of Different Architectures Competitive Reservation Systems Travelocity: Interfacing a CRS to the Web A Broker Workstation Chevron Canada Client-Server Model Comparing the Applications
Matching Design to an Architecture When the Architecture Is a Given Suggested Guidelines Dealing with the Problem ofData
Contemporary Trends in Architecture 14. SYSTEM ALTERNATIVES AND ACQUISITION
Dealing with Obsolescence 328 329 330 332 332 334 335 335 337 338
Establishing Criteria Making a Final Decision
Packages for PCs
370 371
An Example PART FOUR
15. BUILDING SYSTEMS: CREATIVITY 379 WITH TECHNOLOGY
340 342 344 344
A Systems Design Life Cycle
346 346 347 348
User-Oriented Design
353 354
To Buy or Not: Major Applications The Decision Context Processing
355 355 357
The Services Industry
358
What Sources Should Be Selected?
359 359 361
The Pros and Cons of Outsourcing
362
Strategies for Acquiring Equipment and Services Evaluating Performance Acquiring Computers
363 364 364
366 368 369 370
The Design Task
348
366
Enterprise Software Packages
338 338
The Industry
Hardware Software
Dedicated Applications Packages
xix
What Is a System? Multiuser versus Single-User Design
The Roles of Managers, Users, and Designers Potential Pitfalls in the Life Cycle Problems with the Conventional View Design Team
The Spiral Model of Development Data Collection for Analysis and Design Observation Interviews Questionnaires Comparing the Alternatives
Structured versus Object-Oriented Design
380 380 383 383 387 390 391 391 392 392 394 394 394 394 395
The Role of Structured Design Data Flow Diagrams An Example of Structured Design Object-Oriented Design A Comparison ofApproaches
395 396 396 397 401 406
16. BUI LDING SYSTEMS: FURTHER DEVELOPMENTS
412
Systems Analysis
413
XX
CONTENTS
Survey and Feasibility Study Costs and Benefits of New Systems Identifying Systems Alternatives Organizational Impact Technological Feasibility Contents and Formatfor a Study
Determining Feasibility Selection Committee
416 416 418 419 419 420 420 420
Selecting an Alternative
421
Undertaking Systems Analysis
423
Undertaking Systems Design
423 423
Results of the Design Process
General Design Considerations Client-Server Design Graphical User Inteifaces Designing Web Sites The Input Bottleneck Handling Errors Backup
424 425 425 426 428 429 430
Computer-Aided Software Engineering 430 Upper CASE Lower CASE Is Rapid Application Development a Solution? What Is Conversion Effectiveness?
431 431 432 433
APPENDIX A DESIGNING A DISTRIBUTED CLlENT·SERVER SYSTEM: THE HARDSERVE CASE STUDY 441 Goals
The Existing System Problems Decision Considerations Information Flows
A Distributed System Systems Design System Specifications Systems Overview: The Local Store Sales Inventory Control Connecting to the Warehouse
441 442 442 442 442 442 442 446 446 447 448 450
Inquiries Systems Overview: The Warehouse Filling Orders Purchasing Other Processes The Database Input and Output Summary
451 451 452 454 455 455 458 458
APPENDIX B AN OBJECT·ORIENTED EXAMPLE 460
Objects and Classes Creating Subsystems Observations
460 466 469
17. ENHANCING THE LIFE CYCLE: PACKAGES AND OTHER NONTRADITIONAL TECHNIQUES
470
For Whom Are These Approaches Intended?
471
High-Level Design Tools
472
General Packages
473
Dedicated Packages
474 474 475 476
Advantages of Packages Disadvantages of Packages Package Design A Classification Framework for Packages An Example of a Package Acquiring Packages Implementing Packages Conclusions
Prototyping How to Develop a Prototype An Example
A Range of Alternatives 18. REENGINEERING: CHANGING BUSINESSES AND BUSINESS PROCESSES
477 480 481 482 484 484 485 487 488
493
What Is Reeingineering?
494
What Is a Process?
496
CONTENTS
Reengineering a Process at Mutual Benefit Life Reengineering a Process at Merrill Lynch The Old System A New System Evaluation
497 498 499 503 507
Reengineering the Entire Firm at Oticon 508 Reengineering the Entire Firm at Lithonia Lighting Implications Reengineering: Success or Failure?
19. IMPLEMENTING CHANGE
Implementation What Is Implementation? Success or Failure
Research on Implementation A Model of Implementation The Implementation Process
An Implementation Strategy The Role ofDesign Teams An Implementation Framework Some Examples Emergent Change
512 514 515 518 520 520 521 522 523 525 526 527 527 530 532
Implementing IT-Based Transformation of the Organization 533 Analyzing the Costs and Benefits of Change Motivating Organizational Change A Change Program
Beyond Structural Change
535 537 538 541
Supporting Knowledge Workers The Data Warehouse
553 553
Policy Issues for Management
553 553 554 555 555 555
Support Making Mistakes Standards Data Access Is Computing the Right Use of Time?
Benefits from Encouraging Knowledge Workers
Decision-Support Systems DSS Design
Examples of DSSs Yield Management: How to Overbook Gracefully Distributing the Gas at APC
Will Knowledge Workers Design the Entire System?
549
552
562 566
Executive Information Systems
568
Group Decision-Support Systems
570 571
Technology-Assisted Meetings
Groupware and Organizational Knowledge
572
What Are the Options?
580
Multimedia for Business, Education, and Entertainment What Is Digital Convergence? Hypertext: The Engine for Multimedia?
Expert Systems: Applied AI
550
562
568
AI versus Traditional Programs
The Range of User Activities
560 560
The Promise of DSSs
Artificial Intelligence
20. SUPPORTING KNOWLEDGE WORKERS
556
21. ORGANIZATION SUPPORT SYSTEMS: DSSs, GDSSs, EISs, GROUPWARE, 559 AND MULTIMEDIA
22. INTELLIGENT SYSTEMS
PART FIVE
xxi
Components of Expert Systems Knowledge Representation The Inference Engine Systems Development Four Examples
582 586 588 594 595 595 595 597 597 597 598 600
xxii
CONTENTS
Knowledge Discovery
614
Neural Networks
614 617 618 620
Case-Based Reasoning Genetic Algorithms Intelligent Agents PART SIX
23. MANAGEMENT CONTROL OF INFORMATION TECHNOLOGY
Management Control Control Theory Control in the Organization Failure of Control Infonnation and Control
629 630 630 631 633 633
Control of Systems Development
635
Control of Operations
637
Control and Electronic Commerce
640
Auditing Information Systems
641
Management Issues
642
Security Issues: Viruses, Worms, and Other Creatures
642
24. INFORMATION TECHNOLOGY ISSUES FOR MANAGEMENT 650
Management in a Technological Environment What Do CEOs Think? A Political Model ofInfonnation Technology The Chief Infonnation Of
651 651 651 653
The Corporate IS Department A Vision and Plan for IT Outsourcing as a Strategy How Much to Invest in IT Estimating Value Making the Investment Decision A Summary of Issues in Managing IT
655 656 659 662 662 665 669
The Changing World of Information
669
Action Plan
670
Use IT Design Variables to Structure the Organization Determine and Communicate Corporate Strategy
25. SOCIETAL IMPLICATIONS AND THE FUTURE WITH TECHNOLOGY
Social Responsibilities Technology Applications of IT The Impact of IT Some Suggested Solutions
Ethics and Information Technology
671 671
675 676 676 679 681 687 691
The Future with Information Technology
693
Change Revisited
693
Glossary
700
Bibliography
713
Sources for Applications Briefs
719
Index
721
Management of information technology policy and strategy
2
PART O N E
I
I n the first part of this text,
we define an information system and see how
information technology is transforming organizations. Managers have de veloped creative applications of technology that have altered the way mem bers of the organization work and communicate, how customers and sup pliers relate, and even how firms are structured. What is the nature of information? How do individuals interpret data to become information? We will examine decision making in some detail be cause one objective of an information system is to provide information that supports decision making. With this background, we examine frameworks for information systems-frameworks that provide a conceptual model that aids in the design of systems. Part One includes a scenario showing the wide variety of information systems existing today. Figure 1 depicts the process of managing information technology. This figure will appear in each part of the text to provide an introduction to the topics covered in the corresponding chapters. The figure shows that manage ment must first determine a policy and strategy for information technology. Managers should develop a plan for systems. The plan is likely to sug gest new structures for the organization, and it should at least deal with how information services are to be organized. The plan will have an impact on the firm's operations. For example, a plan that includes electronic con nections to customers will change the way orders are processed.
3
4
PART ONE: THE ROLE OF MANAGERS IN I N FORMATION TECHNOLOGY
The plan will identify new applications areas for technology, meaning it will indicate new opportunities for the use of information technology. The plan may assign a high priority to applications that serve customers or to those that automate a factory. In today's environment, it is likely that the plan will contain ideas on how to encourage users to apply technology to solving their own problems. The development of an information technology (IT) architecture is closely related to the structure of the organization. Will the firm use a vari ety of computers from different vendors? Will its computers be networked? Will it have an Intranet as well as Internet connections? Who will manage individual computer installations, and who will authorize expenditures on systems? What kind of communications technology will be used to provide connectivity among different locations and users? The way the firm develops systems is by conducting systems analysis and design. The design of applications has an impact on users since they will be trying to access data in a new system. The entire area of informa tion technology, computers, communications devices and networks, and databases supports the firm's information systems architecture and systems analysis and design. The kinds of systems that are created and the architecture developed for them will have a dramatic impact on the organization. Firms that plan well and develop creative applications will find they have transformed all or some significant aspects of their business. The final management activity is the evaluation and control of informa tion technology in the organization. Does the organization obtain a return from its investment in the technology? Are information systems (IS) under management's control, or is the IS effort fragmented and uncoordinated? All these aspects of the process of managing information technology are discussed in different parts of the text. In this first part of the text, we discuss the nature of information and dif ferent types of applications. Our objective is to develop a common defini tion of an information system and a shared understanding of the nature of information and types of systems. We shall see how technology can lead to major changes in an industry, within an organization, in the economy, and in government policies. This section of the text sets the stage for the rest of the book.
CHAPTER 1
I III
I
Outline The Senior Manager Information Technology in the Workplace A Visit to Brun Passot in France What Is Information Technology? Transforming Organizations Information Technology and the Manager The Challenge of Change Six Major Trends A Preview of the Book
Focus on Change
The study of information technology is the study of change. Throughout the book, each chapter begins with a short section emphasizing the types of changes associated with the technology and application it enables. This chapter presents an overview of technology and the way it transforms organizations. As you read about Brun Pas sot in France, think of how its business has changed as a result of electronic ordering. An experiment with technology was successful, and it influ enced the company's strategy-how it was going to compete in the marketplace. The combination of strategy and information technology helped Brun Pas sot grow its busine s s . Even though a pioneer, the company itself constantly 5
6
PART ONE: THE ROLE OF MANAGERS IN INFORMATION TECHNOLOGY
confronts technological change; it must develop plans for accommodating the Internet as it potentially eclipses the French Minitel system. All of the technol ogy impacts described in this chapter illustrate the tremendous changes associ ated with IT. THE SENIOR MANAGER "A CEO who is not totally knowledgeable about information systems-how to invest in them and how they help the business-just isn't competent. . . . If you look at most successful companies, the senior officers really understand IT." Harvey Padewer, CEO of Aquila Energy, a $4 billion Kansas City company. !
This CEO understands the role and importance of information technology in man aging a twenty-first century organization. Is he alone'? A recent survey by a Chicago-based consulting firm found that: • Information technology and data management are the top priorities for CEOs in the survey. • Ninety percent of the respondents cited information technology as essential in every way or very important for the future success of their business. • One-third cited the use of new technologies as the top critical success factor for the future. • Twenty-six percent attributed their company's current success to using new technology efficiently and to leadership in IT; 33% believe that using new tech nologies and new IT applications are the critical factors for future success. • Fifty-eight percent of the respondents identified loss of competitive advantage as the main consequence of not keeping pace with IT, and 1 3% predicted bank ruptcy as a possible outcome.
The purpose of this book is to help you learn about information technology so you can contribute to the success of your firm. Several experts have suggested that there are two kinds of companies-those that know how to manage technology and use it to advantage and those that are no longer in business. A thorough knowledge of information technology should help you remain competitive and maximize your contributions to the firm. INFORMATION TECHNOLOGY IN THE WORKPLACE
We are living in revolutionary times, a revolution brought on by dramatic ad vances in information technology. If the steam engine, a new form of power, and mechanization created an Industrial Revolution over 1 50 years ago, computers and communications equipment have produced a Technology Revolution in the last half of the twentieth century. During the Industrial Revolution, there were
lInterview in
Computer World, October 19, 1998.
CHAPTER 1 : USING TECHNOLOGY TO TRANSFORM THE ORGANIZATION
three principal innovations: ( 1 ) the substitution of machines for human skill and effort, (2) the substitution of inanimate for animal sources of power-the steam engine-creating an unlimited source of energy, and (3) the substitution of new raw materials, especially minerals, for vegetable and animal substances (Landes, 1 998). The Industrial Revolution changed the nature of work and led to dramati cally higher standards of living. Note the importance of innovation in the Industrial Revolution. In the Technol ogy Revolution we have seen the rapid adoption of many innovations including mainframe computers, minicomputers, personal computers, networks, the Inter net and World Wide Web, assembly language, higher level languages, fourth gen eration languages, spreadsheet programs, word processors, packaged programs, and Web browsers. In the Technology Revolution, companies use IT as a new source of energy for processing and accessing information. This technology helps the organization collect, store, retrieve, and apply knowledge to solve problems; IT converts the raw material of information into useable knowledge. The Technol ogy Revolution, like the Industrial Revolution, has changed the economy, creating new industries and ways of doing business. The computer has been called "the machine that changed the world." We be lieve that information technology has and will continue to revolutionize manage ment. To name a few contributions, IT • Provides new ways to design organizations and new organizational structures. • Creates new relationships between customers and suppliers who electronically link themselves together. • Presents the opportunity for electronic commerce, which reduces purchasing cycle times, increases the exposure of suppliers to customers, and creates greater convenience for buyers. • Enables tremendous efficiencies in production and service industries through electronic data interchange to facilitate just-in-time production. • Changes the basis of competition and industry structure, for example, in the air line and securities industries. • Provides mechanisms through groupware for coordinating work and creating a knowledge base of organizational intelligence. • Makes it possible for the organization to capture the knowledge of its employees and provide access to it throughout the organization. • Contributes to the productivity and flexibility of knowledge workers. • Provides the manager with electronic alternatives to face-to-face communica tions and supervision. • Provides developing countries with opportunities to compete with the industrial ized nations.
A major objective of this text is to communicate the excitement and opportunities provided by this revolution in information technology. But to obtain the benefits described above, one has to be able to manage the technology. In the mid-1 990s, two senior managers lost their jobs over information technology. The long-term chairman of Macy's department stores retired because,
7
8
PART ONE: THE ROLE OF MANAGERS IN INFORMATION TECHNOLOGY
A
a
Oxford Health Plans is a successful health mai ntenance organ ization ( H MO) in the New York area. The firm went public in 1 99 1 , and its stock price enjoyed steady growth. In 1 997, however, problems with a new comp uter syst e m . led to s i g n ificant losses, $1 20 million in the fourth quarter on top of $78 million in the third quarter. When the company announced its second quar terly loss, its stock price was 75 percent lower than its previous high. It was unable to send out monthly bills for many of its cus tomers, and the company could not track payments to hundreds of doctors and hospi tals. During the year, uncollected payments from customers rose to $400 million, while Oxford's unpaid bills to (caregivers) rose to over $650 million. The p ro b l e m b e g a n w h e n Oxfo rd started planning a system , based on the O racle database management syst e m , when i t had a little over 200,000 members. By the t i m e the system went l ive t h ree years later, the HMO had 1 .5 million mem bers. The company tried to convert to the
new system all at once. While the com puter system labored under the load, Ox ford management continued its aggressive drive to sign up new members. The new system was intolerant of errors that were accepted in the old one. As a result, an ac count with thousands of participants might have been rejected for an e rror i n any member's record. Some customers refused to pay t h e HMO after not being billed for months s o Oxford had to write off over $ 1 00 million in uncollectible bills. The HMO's failure to pay its bills also angered care providers: At one point it owed Columbia University $ 1 6 mil lion and Cornell $ 1 7 million for medical services. Oxford lost track of its actual med ical costs-i nformation a health care provider needs to set reserves and project liabilities. While organizations have been i mple menting IT since the 1 950s, we still seem to repeat many of the same problems. Oxford is a clear case of a management fai lu re rather than a technology failure.
though a great merchant, he never developed the skills for choosing computer sys tems or analyzing a balance sheet. The chief executive of the London Stock Ex change resigned over the failure of the Exchange to complete its Taurus paperless settlements system. The Stock Exchange had spent over $ l OO million and esti mated that it would take three more years and twice the initial investment to finish the project (other financial institutions are thought to have invested even more than this amount in the system). At a recent NYU seminar, Hugh McColl, the chairman of NationsBank, re sponded to the question, "What keeps you awake at night?" by saying: "At Na tionsBank, we're spending $500 million a year on software, and about $ 1 .9 billion in total technology costs. I look at those numbers and I worry that when we get there, we'll be at the wrong place, that we don't have it right, that we should have invested in another kind of technology, or just a better mousetrap of some kind" (Stem Business, 1997). In 1998 NationsBank and Bank of America merged. Be fore any savings from eliminating duplication, the new bank will have a combined IT budget of about $4 billion. The new bank faces a major challenge in managing technology and obtaining value from this huge investment.
CHAPTER 1 : USING TECHNOLOGY TO TRANSFORM THE ORGANIZATION
A Have you ever heard of Solectron? It is a major manufacturer, but you will not find its name on any products. Solectron is a virtual supplier for a large number of other compa nies. It manufactures computers, printers, cellular phones, and other electronic goods. It does not manufacture "off-brand" products either; its customers include IBM, Hewlett Packard, and Cisco Systems. Solectron is not an overseas company; it is a U .S. manu facturing company with over 5600 employ ees in California. Solectron is so efficient that H P , I B M , and Texas I nstruments a r e t u r n i n g ove r their factories to the company, including their employees. European companies like Telefon AB, L. M. Ericsson, and Nokia out source some of their production to the U.S. Even Mitsubishi sold some production lines in Georgia to Solectron and contracted with the firm to make cellular phones on the lines. Outsourcers like Solectron can get a prod uct into production quickly to meet changing market demands. Ingram Micro, Inc. is a dis tributor of computer products; it recently hired Solectron to develop and run 1 1 plants world wide to build personal computers. Solectron's annual revenues are around $5 billion. While Solectron does have some production over-
seas, it has added employees and expanded products at factories it purchased from IBM, HP, and Texas Instruments. The company is a study in efficient man ufacturing practices. It invests heavily i n training for its employees, even offering lan guage classes for immigrant workers. While wages are not extremely high, promotion comes quickly; one year 25 percent of the company's Californ ia workers were pro moted. The company buys $3 billion worth of components, giving it some of the best prices. It has lean operating margins, spend ing 90 cents for a dollar of revenue. Solec tron relies on high volume and control of its overhead to make a product. The company is obsessed with quality; it cannot afford to lose a customer or spend a lot of time reworking products with flaws. Each week 1 50 customers grade the com pany on quality. A score below a B- requires managers to present a remedial plan to se nior executives and the customer within three days. We often talk of virtual companies, but forget that they must have outsourcers who provide the services that are virtual. Solec tron is an excellent example of one company that is successful as an outsourcer in the highly competitive manufacturing industry.
Fortunately, there are many IT success stories. A good example is Kennametal Inc., a leading producer of metal-working and mining tools. This company quietly spent the 1 980s investing heavily in new technology to reverse a market slide and stave off powerful foreign competitors. This strategy " . . . propelled it into the ranks of the nation's 500 largest companies . . . . Kennametal's rebound provides a case study of how even companies in stodgy, slow-growing businesses can use information technology to improve their efficiency and provide new services that tum customers into partners. . . . The investment in information technology has allowed it to serve customers more quickly and reduce inventories. The computer systems have also been used to offer customers additional services, like tool man agement support. Kennametal now stocks and manages the tool storage areas for some customers." (New York Times, May 6, 1 992)
9
10
PART ONE: THE ROLE OF MANAGERS IN I N FORMATION TECHNOLOGY
A manager must have a number of skills to succeed in the competitive, global economy that characterizes the end of the twentieth and the beginning of the twenty-first century. One of the most important is an understanding of and ability to manage information technology. The purpose of this text is to prepare you for this important managerial role. A VISIT TO BRUN PASSOT IN FRANCE
Even a relatively small company can use information technology to gain a com petitive advantage. Bmn Passot is one of four major competitors in the French office supplies industry; however, these companies have a combined market share of only 25 percent. There are some 5000 office products distributors in France! The fall of trade barriers among European Community nations has meant that French suppliers now have to compete with British, German, and even U. S. firms. Bmn Passot started as a family firm in 1949. By the early 1 990s with 1 60 em ployees it offered 12,000 products to 6000 customers, delivering to up to 1 5,000 locations. From 1970 to 1992 its sales rose from 1 5 million to 254 million French Francs (FF). In 1 980 Bmn Passot decided that it could distinguish itself from com petitors by offering customers the opportunity to purchase items electronically. By 1 983 the company developed Bureautel, a system that ran on Minitel, the French national videotext network and allowed customers to place orders electronically. Bmn Passot's own employees could also inquire against its inventory and obtain sales and cash flow information from the system. In 1 989 the company enhanced this system by issuing a credit card with a pre defined maximum purchase limit per customer department. As the customer placed orders, their value was subtracted from the credit card. The card was not actually used for payment, but as a way to let customer personnel order supplies without generating a purchase order or getting management approval. The system made it easier to order from Bmn Passot. The card also helped customers maintain control over their department budgets for office supplies. By 1985 large customers encouraged Bmn Pas sot to develop a personal com puter (PC) based system for them. This system was cheaper for customers than Minitel; they could centralize ordering even though requests were generated from mUltiple locations. As the capacity of the French telephone system grew, this sys tem was expanded to provide color photos of each of Bmn Passot's 1 2,000 prod ucts. In 1989 Bmn Passot developed the capability of electronically sending prod uct files, delivery status reports, purchase quotes, shipping notices, invoices, payments, and e-mail messages to clients. (Unfortunately, the company had to print paper invoices, too, since the French justice system did not recognize elec tronic invoices.) Bmn Passot estimates its investment in these applications at FF550,000 with on going operating costs of about FFlOO,OOO covered by fees paid by users. By 1992, 40 percent of Bmn Passot's orders were electronic. Before the end of the decade, the company expects the number of non-Minitel electronic orders to double. The
CHAPTER 1 : USING TECHNOLOGY TO TRANSFORM THE ORGANIZATION
introduction of these systems simplified procedures and freed 25 people to do more selling and visit customers. Since it is easier to predict customer demand, stock turnover has risen from 9 to 1 6 times a year; inventory management costs have also dropped 7 percent (Jelassi and Figon, 1994). Brun Pas sot presents a successful application of technology. It shows that a company does not have to be in the "Fortune 500" to take advantage of IT. The company realized as it faced increasing competition, technology might help it dif ferentiate its services from others in this crowded industry. It successfully man aged the development of multiple applications of technology. Management had to do more than just create systems. It changed the way the firm operated to take ad vantage of the capabilities provided by electronic links to customers. Brun Passot recognized that a computer is more than a computational device; modem informa tion technology provides novel opportunities for communications. As technology contributed more and more to the firm, management began to see electronic com merce as a part of Brun Passot's strategy: Information technology and strategy be came intertwined. Today Brun Pas sot faces the opportunity (and the threat) of the Internet as it must prepare for electronic commerce on a new medium as well as maintain its existing Minitel applications. Throughout the text, we shall see examples of firms that have developed cre ative applications of technology to give them an edge on competitors. These cases illustrate the firms' ability to manage technology and to use IT to transform the very structure of the organization. WHAT IS INFORMATION TECHNOLOGY?
Information technology refers to all forms of technology applied to processing, storing, and transmitting information in electronic form. The physical equipment used for this purpose includes computers, communications equipment and net works, fax machines, and even electronic pocket organizers. Information systems execute organized procedures that process and/or communicate information. We define information as a tangible or intangible entity that serves to reduce uncer tainty about some state or event. Data can originate from the internal operations of the firm and from external entities such as suppliers or customers. Data also come from external databases and services; for example, organizations purchase a great deal of marketing and competitive information.· Brokerage firms provide a variety of research on differ ent companies to clients. An information system usually processes these data in some way and pre sents the results to users . With the easy availability of personal computers, users often process the output of a formal system themselves in an ad hoc man ner. Human interpretation of information is extremely important in under standing how an organization reacts to the output of a system. Different results may mean different things to two managers. A marketing manager may use sta tistical programs and graphs to look for trends or problems with sales. A finan cial manager may see a problem with cash flow given the same sales data. The
11
12
PART ONE: THE ROLE OF MANAGERS I N INFORMATION TECHNOLOGY
recipient of a system's output may be an individual, as in the example of the marketing manager, or it may be a workgroup. Many systems are used routinely for control purposes in the organization and require limited decision making. The accounts receivable application generally runs with little senior management oversight. It is a highly structured application with rules that can be followed by a clerical staff. A department manager han dles exceptions. The output of some systems may be used as a part of a program or strategy. The system itself could be implementing a corporate strategy, such as simplifying the customer order process. A system might help managers make decisions. Information technology, however, extends far beyond the computational capa bilities of computers. Today computers are used extensively for communica tions as well as for their traditional roles of data storage and computation. Many computers are connected together using various kinds of communications lines to form networks. There are more than 43 million host computers, for example, on the Internet, and over 1 00 million computers around the world access it, an estimated 70 million of which are in the U.S . Through a network, individuals and organizations are linked together, and these linkages are changing the way we think about doing business. Boundaries between firms are breaking down from the electronic communications link provided by networks. Firms are will ing to provide direct access to their systems for suppliers and customers. If the first era of computing was concerned with computation, the second era is about communications.
CHAPTER 1 : USING TECHNOLOGY TO TRANSFORM THE ORGANIZATION
Supervision based on trust Delegation of tasks Decentralized decision making
Matrix Management Technological Matrixing
�f¥
� I �� I�
Strong IT management Workstations and networks
FIGURE 1 ·1
The T-Form organization.
TRANSFORMING ORGANIZATIONS
How is information technology changing organizations? One impact of IT, dis cussed in depth in Chapter 4, is its use to develop new organizational structures. The organization that is most likely to result from the use of these variables is the T-Form or Technology-Form organization, an organization that uses IT to become highly efficient and effective (Lucas, 1 996). Figure 1-1 presents the characteristics of a technology-enabled organization. The firm has a flat structure made possible by using e-mail and groupware (programs that help coordinate people with a common task to perform) to increase the span of control and reduce managerial hierarchy. Employees coordinate their work with the help of electronic communications and linkages. Supervision of employees is based on trust because there are fewer face-to-face encounters with subordinates and colleagues than in today's organization. Managers delegate tasks
13
14
PART ONE: THE ROLE OF MANAGERS I N INFORMATION TECHNOLOGY
and decision making to lower levels of management, and information systems make data available at the level of management where it is needed to make deci sions. In this way, the organization provides a fast response to competitors and customers. Some members of the organization primarily work remotely without having a permanent office assigned. The company's technological infrastructure features networks of computers. Individual client workstations connect over a network to larger computers that act as servers. The organization has an internal Intranet, and internal client com puters are connected to the Internet so members of the firm can link to cus tomers, suppliers, and others with whom they need to interact. They can also ac cess the huge repository of information contained on the Internet and the firm's own Intranet. Technology-enabled firms feature highly automated production and electronic information handling to minimize the use of paper and rely extensively on images and optical data storage. Technology is used to give workers jobs that are as com plete as possible. In the office, companies will convert assembly line operations for processing documents to a series of tasks that one individual or a small group can perform from a workstation. The firm also adopts and uses electronic agents, a kind of software robot, to perform a variety of tasks over networks. These organizations use communications technology to form temporary task forces focused on a specific project. Technology like e-mail and groupware facili tate the work of these task forces. These temporary workgroups may include em ployees of customers, suppliers, and/or partner corporations; they form a virtual team that meets electronically to work on a project. The organization is linked extensively with customers and suppliers. There are numerous electronic customer/supplier relationships. These linkages increase re sponsiveness, improve accuracy, reduce cycle times, and reduce the amount of overhead when [ums do business with each other. Suppliers access customer com puters directly to learn of their needs for materials, then deliver raw materials and
CHAPTER 1 : USING TECHNOLOGY TO TRANSFORM THE ORGAN IZATION
assemblies to the proper location just as they are needed. Customers pay many suppliers as the customer consumes materials, dispensing with invoices and other documents associated with a purchase transaction. The close electronic linking of companies doing business together creates vir tual components where traditional parts of the organization appear to exist, but in reality exist in a novel or unusual manner. For example, the traditional inventory of raw materials and subassemblies is likely not to be owned or stored by a manu facturing firm. This virtual inventory actually exists at suppliers' locations. Possi bly the subassemblies will not exist at all; suppliers will build them just in time to provide them to the customer. From the customer's standpoint, however, it appears that all needed components are in inventory because suppliers are reliable partners in the production process. This model of a technology-enabled firm shows the extent to which managers can apply IT to transforming the organization. The firms that succeed in the turbu lent environment of the twenty-first century will take advantage of information technology to create innovative organizational structures. They will use IT to de velop highly competitive products and services, and will be connected in a net work with their customers and suppliers. The purpose of this book is to prepare you to manage in this technologically sophisticated environment of the twenty first century. INFORMATION TECHNOLOGY AND THE MANAGER
Managers are involved in a wide range of decisions about technology, decisions that are vital to the success of the organization. Some 45 to 50 percent of capital in vestment in the U.S. is for information, according to the Department of Commerce and other sources; Business Week estimates that there are 63 PCs per 1 00 workers in the U.S. (including machines at home), and others have estimated that one in three U.S. workers uses a computer on the job. A recent survey of 373 senior execu tives at large U.S. and Japanese companies found that 64 percent of the U.S. man agers said they must use computers in their jobs. Other surveys have suggested that as many as 88 percent of managers use computers. One estimate is that in 1996, U.S. firms spent $500 billion on information technology while the IT bill for the world was $ 1 trillion (Scientific American, July 1997). Because this technology is so pervasive, managers at all levels and in all functional areas of the firm are in volved with IT. Managers are challenged with decisions about: • The use of technology to design and structure the organization. • The creation of alliances and partnerships that include electronic linkages. There is a growing trend for companies to connect with their customers and suppliers, and often with support service providers like law firms. • The selection of systems to support different kinds of workers. Stockbrokers, traders, and others use sophisticated computer-based workstations in performing their jobs. Choosing a vendor, designing the system, and implementing it are major challenges for management.
15
16
PART ONE: THE ROLE OF MANAGERS I N I N FORMATION TECHNOLOGY
• The adoption of groupware or group-decision support systems for workers who share a common task. In many firms, the records of shared materials constitute one type of knowledge base for the corporation. • Determining a World Wide Web strategy. The Internet and World Wide Web (Chapter 1 2) offer ways to provide information, communicate, and engage in commerce. A manager must determine if and how the firm can take advantage of the opportunities provided by the Web. • Routine transactions processing systems. These applications handle the basic business transactions, for example, the order cycle from receiving a purchase order through shipping goods, invoicing, and receipt of payment. These routine systems must function for the firm to continue in business. More often today managers are eliminating physical documents in transactions processing and substituting electronic transmission over networks. • Personal support systems. Managers in a variety of positions use personal com puters and networks to support their work. • Reporting and control. Managers have traditionally been concerned with con trolling the organization and reporting results to management, shareholders, and the public. The information needed for reporting and control is contained in one or more databases on an internal computer network. Many reports are filed with the government and can be accessed through the Internet and the World Wide Web, including many 10K filings and other SEC-required corporate reports. • Automated production processes. One of the keys to competitive manufacturing is increasing efficiency and quality through automation. Similar improvements can be found in the services sector through technologies such as image process ing, optical storage, and workflow processing in which paper is replaced by electronic images shared by staff members using networked workstations. • Embedded products. Increasingly, products contain embedded intelligence. A modern automobile may contain six or more computers on chips, for example, to control the engine and climate, compute statistics, and manage an antilock brake and traction control system. A colleague remarked a few years ago that his washing machine today contained more logic than the first computer he worked on! THE CHALLENGE OF CHANGE
A major feature of information technology is the changes that IT brings. Those who speak of a revolution from technology are really talking about change. Busi ness and economic conditions change all the time; a revolution is a discontinuity, an abrupt and dramatic series of changes in the natural evolution of economies. In the early days of technology, change was gradual and often not particularly signifi cant. The advent of personal computers accelerated the pace of change, and when the Internet became available for profit-making activities around 1 992, change be came exponential and revolutionary. To a great extent, your study of information technology is a study of change.
CHAPTER 1 : USING TECHNOLOGY TO TRANSFORM THE ORGAN IZATION
In what way can and does technology change the world around us? The impact of IT is broad and diverse; some of the changes it brings are profound. Information technology has demonstrated an ability to change or create the following: • Within organizations Create new procedures, workflows, workgroups, the knowledge base, prod ucts and services, and communications. • Organizational structure Facilitate new reporting relationships, increased spans of control, local deci sion rights, supervision, the formation of divisions, geographic scope, and "virtual" organizations. • Interorganizational relations Create new customer-supplier relations, partnerships, and alliances. • The economy Alter the nature of markets through electronic commerce, disintermediation, new forms of marketing and advertising, partnerships and alliances, the cost of transactions, and modes of governance in customer-supplier relationships. • Education Enhance "on campus" education through videoconferencing, e-mail, electronic meet ings, groupware, and electronic guest lectures. Facilitate distance learning through e-mail, groupware, and videoconferencing. Provide access to vast amounts of reference material; facilitate collaborative projects independent of time zones and distance.
• National development Provide small companies with international presence and facilitate commerce. Make large amounts of information available, perhaps to the consternation of cer tain governments. Present opportunities to improve education.
SIX MAJOR TRENDS
In the past few years, six major trends have drastically altered the way organiza tions use technology. These trends make it imperative that a manager become fa miliar with both the use of technology and how to control it in the organization. These trends, discussed further in later chapters, are as follows: 1. The use of technology to transform the organization. The cumulative effect of what all the technology firms are installing is to transform the organiza tion and allow new types of organizational structures. Sometimes the trans formation occurs slowly as one unit in an organization begins to use group ware. In other cases, like Kennametal or Oticon, a Danish firm discussed in Chapter 1 8, the firm is totally different after the application of technology. This ability of information technology to transform organizations is one of the most powerful tools available to a manager today.
17
18
PART ONE: THE ROLE OF MANAGERS I N I N FORMATION TECHNOLOGY
2. The use of information processing technology as a part of corporate strategy. Firms like Bron Pas sot are implementing information systems that give them an edge on the competition. In Chapter 5 we look at this phenomenon and study some examples. Firms that prosper in the coming years will be managed by individuals who are able to develop creative, strategic applications of the technology. 3. Technology as a pervasive part of the work environment. From the largest corporations to the smallest business, we find technology is used to reduce labor, improve quality, provide better customer service, or change the way the firm operates. Factories use technology to design parts and control pro duction. The small auto-repair shop uses a packaged personal computer sys tem to prepare work orders and bills for its customers. The body shop uses a computer-controlled machine with lasers to take measurements so it can check the alignment of automobile suspensions, frames, and bodies. In this text we shall see a large number of examples of how technology is applied to change and improve the way we work. 4. The use of technology to support knowledge workers. The personal computer has tremendous appeal. It is easy to use and has a variety of powerful software programs available that can dramatically increase the user's productivity. When connected to a network within the organization and to the Internet, it is a tremendous tool for knowledge workers. 5. The evolution of the computer from a computational device to a medium for communications. Computers first replaced punched card equipment and were used for purely computational tasks. From the large centralized com puters, the technology evolved into desktop, personal computers. When users wanted access to information stored in different locations, companies developed networks to link terminals and computers to other computers. These networks have grown and become a medium for internal and external communications with other organizations. For many workers today, the communications aspects of computers are more important than their compu tational capabilities. 6. The growth of the Internet and World Wide Web. The Internet offers a tremen dous amount of information on-line, information that you can search from your computer. See Figure 1-2 which is from the United Nations Development Program site; this site contains a number of statistics on development one can view and download for further analysis. Networks link people and organiza tions together, greatly speeding up the process of communications. The Inter net makes expertise available regardless of time and distance, and provides ac cess to information at any location connected to the Internet. Companies can expand their geographic scope electronically without having to open branch offices. The Internet leads naturally to electronic commerce-creating new ways to market, contract for, and complete transactions.
What does all this mean for the management student? The manager must be a competent user of computers and the Internet, and learn to manage information
CHAPTER 1 : USING TECHNOLOGY TO TRANSFORM THE ORGANIZATION
FIGURE 1 ·2
Part of the United Nations Development Program web site.
technology. The personal computer connected to a network is as commonplace in the office as the telephone has been for the past 75 years. Managers today are ex pected to make information technology an integral part of their jobs. It is the man ager, not the technical staff member, who must come up with the idea for a sys tem, allocate resources, and see that systems are designed well to provide the firm with a competitive edge. You will have to recognize opportunities to apply tech nology and then manage the implementation of the new technology. The success of information processing in the firm lies more with top and middle management than with the information services department. A PREVIEW OF THE BOOK
With this introduction to the information systems field, we are prepared to explore the nature of information in greater detail. Table 1-1 lists some important IT man agement issues and indicates where they are discussed in the book. In Chapter 2 we examine the nature of decision making and managerial activities, and Chapter 3 introduces several frameworks for systems. Part Two deals with the interaction of the organization and information systems. Part Three discusses computer tech nology. You need a basic understanding of computers to make management deci sions about information systems. In Part Four, we present systems analysis and design techniques, topics of vital importance for a user. We advocate that users form a significant part of the design team and that a user be in charge of the design of a new system. Part Five presents some exciting direction in systems. Finally, Part Six discusses issues of senior management concern: the relationship between user departments and the informa tion services department, and the social impacts of information technology.
19
20
PART ONE: THE ROLE OF MANAGERS IN I N FORMATION TECHNOLOGY
.
TABLE 1 - 1 EXAMPLES OF IT MANAGEMENT ISSUES
Issue
Chapter
Explanation
Using technology to design efficient and effective organizations
1,4
IT enables new types of organizations and relationships among suppliers and customers.
Developing a plan for information technology in the organization
5, 24
Planning allows you to anticipate problems and prepare for opportunities. Instead of reacting to problems as they arise, a plan prepares you to make decisions that are integrated with corporate strategy.
Using IT as a part of corporate strategy
5
Firms use IT to gain an advantage over the competition and to sustain that advantage.
Taking advantage of interorganizational systems
4, 5
Deciding on and developing new applications of IT Reengineering business processes
Adopting special applications
Using IT to design organizations and as a part of strategy often involves developing applications that connect two organizations, such as links between a manufacturer and a supplier for ordering and delivering materials to a factory.
1 5-1 7
Organization design, strategy, and planning will all lead to new applications of technology in the organization. You must design and implement these new applications.
18
Reengineering is a major trend in business; you are seeking order of magnitudes improvements in a business process. This kind of radical change has a major impact on the organization and its employees, making success difficult.
21 , 22
There are a number of IT applications that can have a real payoff for the organization including decision-support systems, expert systems, and groupware.
Changing the organization
19
One of the greatest challenges, and a requirement to obtain real value from technology, is to create meaningful change. When you develop new applications, you change some aspect of the business. When you use IT organization design variables, you are transforming the entire organization.
Managing the IT infrastructure in a time of explosive growth and technological change
13
You must make decisions about:
Deciding whether and what to outsource
Deciding how much to invest in IT
13 9, 1 3 11, 12 12 12 13
The migration to client-server computing Client (desktop) software standards Networking in general Presence on and use of the I nternet Electronic commerce The integration of heterogeneous hardware and software across computers and networks
1 4 , 24
Outsourcing means that you hire some other organization to perform a service. A significant number of firms use outsourcing for some part of their IT function, for example, running a communications network, developing a new application, or even managing the firm's entire IT effort.
24
All the decisions above add up to the sum total that you are investing in information technology.
CHAPTER
1:
USING TECHNOLOGY TO TRANSFORM THE ORGANIZATION
CHAPTER SUMMARY
1. Information technology is responsible for a revolution that will equal or ex ceed the impact of the Industrial Revolution on business. 2. Managers, no matter what their primary functional interest-marketing, fi nance, production, or human relations-make decisions about technology. 3. Firms that succeed in the twenty-first century will use technology to create their structure, manage themselves, market goods and services, and communi cate with a variety of external organizations. 4. You will use the Internet routinely and encounter networks of computers within companies connecting a variety of organizations. 5. Managers are responsible for finding creative, strategic uses of information technology, applications that will give them an edge over the competition. 6. You will face a number of challenges managing the technology and seeing that the firm obtains a return from its investments in IT. In all of these efforts, you will be using technology to bring change to the organization, its employees, customers, suppliers, and marketplace. IMPLICATIONS FOR MANAGEMENT
Networking has added a variety of new ways to communicate electronically. Infor mation technology today provides computational and communications capabilities that were inconceivable a decade ago. A manager has to know enough about tech nology to take advantage of the power IT offers. We are not talking about building an isolated application-rather the technology exists to affect the fundamental way the organization is structured, its operations, and its relations with other or ganizations like suppliers and customers. Companies and managers that succeed in thefuture will use information technology in all aspects of their business. KEY WORDS
Application Communications Computer Data Decision making Information Information technology (IT) Integration Internet Interpretation Network Output Processing System T-Form organization User
21
22
PART ONE: THE ROLE OF MANAGERS IN I N FORMATION TECHNOLOGY
RECOMMENDED READING Applegate, L.; W. McFarlan; and J. McKenney. Corporate Information Systems Manage ment. 5th ed. New York: Irwin-McGraw-Hill, 1999. (An excellent discussion of the is sues managers face in dealing with the technology.) Landes, D., The Wealth and Poverty of Nations: Why Some Are So Rich and Some So Poor. New York: W. W. Norton, 1998. (The author believes nations that strive for high levels of education and gender equality and that embrace technology create the highest standards of living.) Mason, R.; and I. Mitroff. "A Program for Research in Management Information Systems," Management Science, 19, no. 5 (January 1973), pp. 475--487. (This article describes an information system from the perspective of an individual decision maker. While delving into the philosophical concepts underlying information systems, it presents a very ap pealing framework for the study of systems.) Nolan, R.; and D. Croson. Creative Destruction. Boston: Harvard Business School Press, 1995. (A book devoted to the need for organizational transformation.)
DISCUSSION QUESTIONS 1. What
is responsible for the explosion of information technology that has occurred over the past several decades? 2. What role does the manager play in the management of information technology? 3. Why does the introduction of information technology in an organization result in complications? 4. What are the characteristics of a technologically enabled organization? S. What is the difference between using technology for computations and for communica tions? 6. Can you think of definitions of information systems other than the one presented in this chapter? What are the advantages and disadvantages of these definitions compared with the one we adopted? 7. How can there be more than one interpretation of information? Can you think of ex amples in which the same information is interpreted in different ways by different individuals? 8 . What is the value of information? How would you try to assess the value of informa tion to a decision maker? 9. What different types of information exist? Develop categories for describing or classi fying information, for example, timeliness and accuracy. Develop an example or two of information that would fall into each category. 10. What kind of management leadership do you suppose was required for Kennametals to turn its business around? 11. How would you define successful change? How would you measure it? 12. Can you think of an example in which the failure of an information system led to a major disaster? What can we learn from such a catastrophe? 13. To what extent do organizations now depend on the success of information technology to stay in business? 14. What is the relationship between information systems and marketing? 15. How have the six trends in information technology discussed in this chapter influenced management?
CHAPTER 1 : USING TECHNOLOGY TO TRANSFORM THE ORGANIZATION
16.
How have computers evolved to take on an important role in communications? advantages does the Internet provide for a company? 18. What are the most significant aspects of the Brun Passot applications described in this chapter? 19. What factors would you consider if you were placed on a design team developing a new information system? What would be your major concern about the project? 20. What are the pros and cons of not providing workers like the sales force with a physical office, but instead equipping them with information technology for communications purposes, for example, notebook computers and Internet connectivity? 17. What
CHAPTER 1 PROJECT
S i m on Marsh a l l Associates Mary Simon and John Marshall were business school students together. They took jobs at different financial firms after graduation. At their five-year class reunion, Mary and John got together to trade notes on their experiences after graduation. Mary began, "I've had a lot of fun working in the financial business; we've weathered some good and bad times at my company. I had to begin doing financial statement analysis, but in a year I moved into mergers and acquisitions. That's pretty exciting stuff." John replied, "Sounds like things have been going well for you; there certainly have been a lot of mergers and acquisitions since we left school. I've been into funds management. I manage a pretty big portfolio and also have a chance to come up with new investment products." "I guess I'm happy, but I sometimes get pretty tired of the bureaucracy of a big company," observed Mary. "I know what you mean," responded John. "One crazy trader lost $200 million in a week and wiped out our firm's profit for the year and our bonuses along with it. Sometimes I think if I were braver I'd go out on my own." "Funny you should say that; I've been thinking of doing the same thing. . . ." That chance meeting at the reunion led to further discussions. A year later, the two classmates formed Simon Marshall Associates. They described themselves as a "boutique" for special services. Mary observed, "We obviously can't offer the same kind of capital that a big in vestment bank or brokerage firm can. However, we're very good at personal ser vices. Since John is used to managing money, our strategy has been to attract wealthy investors who trust us to take care of their funds." John added, "I try to find out what they're interested in-growth, steady in come, and so on-and then advise them on what to put in their portfolios. We have tried to get clients who are active in business as well as retired people or clients just living on their capital. If I can make a business owner happy, we may have a shot at helping that person with a merger or acquisition."
23
24
PART ONE: THE ROLE OF MANAGERS IN I N FORMATION TECHNOLOGY
Mary said, "I knew the merger activity would take a while to get going, and it has. We've helped one firm buy another one, and a couple of our wealthy investors have decided to get back into business, so I found some opportunities for them." John observed, "I'm pretty satisfied with where we are now. Both Mary and I are making less money than we were before we started the company, but we're having a lot more fun." Mary went on: "I agree. One thing we have to do, though, is bring in comput ers. Of course, we have quote machines, but we've been so busy talking with clients that we haven't had much time to keep up-to-date with the technology." "The computers at my previous firm were fantastic, at least in cost;' John said. "I wouldn't want us to get into that kind of overhead here. I wish we could get something that would be appropriate for our business, not a big system that wouldn't work properly half the time anyway." Discuss the kind of information you think a firm like Simon Marshall needs. What role do you think technology might have in a firm like this one?
CHAPTER 2
d I
ati
Outline The Nature of Information
What Is Information? How People Interpret Information
A Model for Interpreting Information Characteristics of Information From Information to Knowledge
The Decision-Making Process Problem Finding and Solving Types of Decisions How Do Individuals Make Decisions?
Stages in the Decision-Making Process The Influence of the Organization A Scenario for the Not-Too-Distant Future
Focus on Change
This chapter is about how people use information to make decisions. Technology has PfQvided decision makers with new sources of information and tools for analy sis. Consider the phenomenon of the Internet and the vast amount of information available, often at no charge, to people facing a decision. If you plan to buy an au tomobile, there are at least three Web sites that provide retail sticker prices and 25
26
PART ONE: THE ROLE OF MANAGERS IN INFORMATION TECHNOLOGY
dealer invoice car prices. Auto-by-Tel sends your requirements to dealers for a bid, and a new service, Priceline, sends your bid for a specific vehicle to a group of dealers to see if one of them will sell you the car at your price. In organizations, vast databases contain information and knowledge about the firm. The decision maker uses powerful software packages and workstations connected to networks to access data and perform complex analyses. Information technology has had a profound impact on the way we make decisions. THE NATURE OF INFORMATION
The last chapter described the broad categories of change stimulated by technol ogy. Many of the contributions of IT involve people and their use of information. Individuals seek information for many reasons, for example, to make decisions, evaluate a proposal, answer questions from a customer, and so on. Too many infor mation systems have failed, not because of their underlying technology, but be cause they did not contribute much to solving user problems. These systems may have provided inappropriate or inaccurate information, addressed the wrong prob lem, or suffered from other flaws that came about because designers did not un derstand how managers make decisions and use information. The objective of this chapter is to discuss information and decision making before we delve heavily into the technology used to support it. What Is Information?
We define information as some tangible or intangible entity that reduces uncer tainty about some state or event. As an example, consider a weather forecast pre dicting clear and sunny skies tomorrow. This information reduces our unct
A classic article on information systems suggested in part that an information system serves an individual with a certain cognitive style faced with a particular decision problem in some organizational setting (Mason and Mitroff 1973). In
CHAPTER
2:
INTERPRETING AND UNDERSTANDING INFORMATION
FIGURE 2-1
Influences on the interpretation and use of information.
addition to these variables, we suggest the importance of personal and situational factors in the interpretation of information. We shall examine each of these fac tors to see how they influence the interpretation process. (See Figure 2- 1 . ) Clearly, the nature of the problem influences the way w e interpret information. How serious is the decision? What are the consequences of an incorrect decision, and how do they compare with the benefits of a correct one? An important decision
27
28
PART ONE: THE ROLE OF MANAGERS IN INFORMATION TECHNOLOGY
may require more care in analyzing data than would a minor decision. For example, a bank's decision to merge with a stock brokerage firm is more important than its decision to lease additional office space. In such a strategic decision as whether to merge, the consequences and costs involved, plus the impact on the organization, require that information be scrutinized much more closely. The organization itself affects the interPretation of information. Studies have shown that the individual becomes socialized by the organization. Over time we are influenced by our organizations in the way we approach problems. Thus, in most instances, the attitudes of a new employee will differ substantially from those of the chairman of the board. As the new employee associates over the years with other employees of the firm, he or she is influenced by their attitudes and by the environment of the workplace. Gradually, new employees begin to change their at titudes to be more consistent with those of their associates. People who have different ideas interpret information differently. Again, many of a person's ideas are influenced by peers and by the socialization process in the particular organization where the individual works. Several individuals trying to influence the government to regulate prices in an industry may use the same infor mation. However, the head of a corporation in the industry, the leader of a con sumer group, and a goveniment decision maker in a regulatory agency will proba bly interpret the same information differently. Personal and situational factors also influence the interpretation of information. One study done many years ago showed that given comparable information, deci sion makers interpreted a problem differently depending on their position. In this exercise, finance executives saw financial problems, sales executives recognized sales problems, and so forth. In all the given scenarios, the information was the same-it was just interpreted differently (Dearborn and Simon, 1 958). (A more re cent study found managers are getting less parochial, though personal experience suggests that many managers are heavily influenced in problem diagnosis by their backgrounds and position.) Psychologists studying the thought patterns of individuals have developed the concept of cognitive style. Although there is no agreement on exactly how to de scribe or measure different cognitive styles, the concept is appealing since peo ple do seem to have different ways of approaching problems. One of the sim plest distinctions is between analytic and heuristic decision makers. The analytic decision maker looks at quantitative information. Engineering is a pro fession attractive to an analytic decision maker. The heuristic decision maker, on the other hand, is interested in broader concepts and is more intuitive. Most researchers believe that we are not analytic or heuristic in every problem but that we do have preferences and tend to approach the same type of problem with a consistent cognitive style. A Model for Interpreting Information
We have suggested a number of factors that influence the interpretation of in formation. How are all these factors combined? What is their net impact on the
CHAPTER
2:
INTERPRETING AND UNDERSTANDING INFORMATION
FIGURE 2·2
Model for interpreting information.
interpretation of information? Figure 2-2 summarizes all the variables described above. The figure portrays one representation of how a user of information sys tems develops a model to interpret information and how he or she would con stantly execute and revise the model. In the model, to interpret data a decision maker draws on current data and a his tory of past decisions and their results. The interpretation turns data into informa tion, and the decision maker takes some action. He or she observes the results and stores them for future reference. We expect the model to be formed inductively by the decision maker and to be heavily influenced by beliefs. For example, a decision maker may observe data on sales and production over time and find that these data seem to predict customers'
29
30
PART ONE: THE ROLE OF MANAGERS IN INFORMATION TECHNOLOGY
reactions to a product. The decision maker is building an interpretational model based on his or her beliefs and analysis of historical data and observations. After testing the interpretational model and developing confidence in it, the de cision maker uses the model deductively. He or she observes data and uses the model to interpret them. Now, the decision maker perceives data on sales and pro duction as constituting information on product acceptance; he or she may even ig nore other information conveyed by these data. After an interpretational model has been formed, further experiences are fed back to modify the model. Past decisions, problems, and experiences all influence the future interpretation of information. These experiences are based on actions taken on the basis of information and the results of those actions. If changes in a new product based on sales and production data increase sales, the interpretational model described above will be reinforced. Characteristics of Information
Information can be characterized in a number of ways; some kinds of information are more suitable for decision making than others. The time frame for information can be historical or predictive. Historical information can be used to design alter native solutions and to monitor performance. Information may be expected or it may be unanticipated. Some information systems experts feel that information is worthless unless it is a surprise to the recipient. However, information that con firms something also reduces uncertainty. Surprise information often alerts us to the existence of a problem; it is also important in developing and evaluating differ ent alternatives. Information may come from sources internal to the organization or from external sources, such as government agencies. Information may be presented in summary form or in detail and vary in accu racy. Summary information is often sufficient for problem finding, but summary and detailed information may be needed for other uses. Information can be fre quently updated, relatively old, loosely organized, or highly structured. An exam ple of highly structured information is a report with clear categories to classify all the information it contains. Loosely organized information might be a report com posed of different forms of information from multiple sources. In general, different types of decisions require different kinds of information and providing inappropriate information is one common failing of information systems. (See Table 2-1 . ) Operational control decisions are characterized by his torical information. Usually the results are expected and the source of the informa tion is the internal operations of the organization. The data-for example, produc tion control data, inventory status, or accounts receivable balances-must be detailed. Because operational control decisions involve day-to-day operations of the firm, information often must correspond closely to real time. This information is often highly structured and precise. Information for strategic decisions, on the other hand, is more predictive and long range in nature. Strategic planning may uncover many surprises. Often, ex ternal data on the economy, the competition, and so forth are involved in strategic decision making. Summary information on a periodic basis is adequate; there is
CHAPTER
2:
INTERPRETING AND UNDERSTANDING INFORMATION
TABLE 2· 1 INFORMATION CHARACTERISTICS VERSUS DECISION TYPES
Decision type Characteristics
Operational control
Time frame Expectation Source Scope Frequency Organization Precision
Historical Anticipated Largely internal Detailed Real time Highly structured Highly precise
Managerial control
Strategic planning
Predictive Surprise Largely external Summary Periodic Loosely structured Not overly precise
usually no need for highly detailed or extremely precise information. Strategic planning decisions are usually characterized by loosely structured information. The requirements for managerial control decisions fall between operational con trol and strategic planning. Obviously, there are many ways to classify information, and this complicates the decision maker's problem in expressing what output is desired from an information system. The most important thing for the user of an information system to be aware of is the intended use of the information and the type of decision he or she is facing. Then the user should try to decide on the general characteristics of the information needed, using categories such as these as guidelines to develop more detailed infor mation requirements. Consideration of similar characteristics should enable the user to avoid requesting grossly inappropriate information from an information system. FROM INFORMATION TO KNOWLEDGE
Knowledge is a strategic resource for many organizations. We can define knowl edge as "information plus know-how" (Kogut and Zander, 1 992). Information alone is not enough to produce knowledge; we must also understand the best way to use information to solve a problem, contribute to a product or service, or make a similar contribution to the organization. Knowledge builds over time in the heads of employees in the form of past decisions, processes in the organization, charac teristics of products, interests of customers, and similar experiences. A colleague of mine likes to tell the story of a New England company that de cided to move to the South. It offered all current employees jobs but would pay the moving expenses only of employees above a certain management level. When the company left for its new location, most of the staff stayed behind. Within a year, the company was bankrupt. It had lost the knowledge that the staff possessed on how to run the business. Customers did not like dealing with new order processing and customer service staff members who did not know their business and needs. These customers began to place their orders with competitors, and the firm could not survive its loss of knowledge from the staff it left behind.
31
32
PART ONE: THE ROLE OF MANAGERS IN I N FORMATION TECHNOLOGY
H I nformation technologies have the potential to replace the functions performed by mort gage bankers, according to the president of Freddie Mac. Internet mortgage sites are encroaching on the traditional banker as a source of information; some of them allow the home buyer to close on a mortgage on-line. Before the closing, of cou rse, an ap proval is req u ired. A banker checks the credit of a mortgage applicant and deter mines the likelihood that he or she will be able to repay the loan. Computerized un derwriting systems are reducing the time and effort required to check on credit, with the time from application to closing drop p i n g from weeks to days. Anyo n e w h o wishes t o b e in t h e mortgage business can evaluate a borrower's credit with a com puterized system; an experienced mort gage banker is no longer needed for this task. The p resident of Freddie Mac thi n ks that technology will force a consolidation of the industry and that a number of tradi tional firms will no longer be in business in the future. Freddie Mac and Fannie Mae dominate the purchase of mortgages for re sale as securities to investors. Freddie Mac
offers an automated underwriting system that is being used by 700 lenders to com pute a "score" for 1 000 mortgages a week. The system cuts closing costs by $300 to $650 for the borrower. About 1 000 mort gage originators use Fannie Mae's under writing system for 1 0,000 transactions per month. The Freddie Mac Loan Prospector sys tem evaluates whether the loan will be ac ceptable for immediate sale to the agency. The system uses statistical methods to fore cast the creditworthiness of the borrower consistently and accu rately; the agency claims the prog ram outperforms h u man mortgage bankers. Freddie Mac estimates that systems like this could save borrowers $2 billion a year in closing costs. Some ap plicants will be moved out of subprime cate gories into conventional mortgages at a sav ings to them of up to $ 1 00 million a year in interest payments. Fannie Mae has experienced a 1 4 per cent rise in productivity as measured by its annual mortgage origination volume divided by employees in mortgage banking. The
(continued)
Highly developed countries are in a "post-industrial" age; they have far more employees in the services industry than in manufacturing. Most of these people work with information and rely on their knowledge to earn income; employees in this sector are often called "knowledge workers." For such organizations, knowl edge is a strategic resource; it is valuable and hard to imitate. Imagine a company like Andersen Consulting with over 45,000 employees worldwide. When a new client approaches Andersen Consulting with a problem, there is probably someone at the consulting firm that has relevant knowledge to help solve the problem. An dersen's consultants represent a huge investment in knowledge; the firm's chal lenge is to capture that knowledge and make it available throughout the world. An dersen Consulting uses information technology, including groupware and an Intranet, to help meet this challenge. It is instructive to look at different types of knowledge; Nonaka (1994) distin guishes between explicit and tacit knowledge. Explicit knowledge is represented
CHAPTER
technology has also reduced paper, substi tuting electronic appl ications, which the agencies return i n four minutes. An Elec tronic Mortgage Registration System com pletes the process; there will be no more paper mortgages to burn when the borrower makes the final payment. Freddie Mac and Fannie Mae are working with lenders, title companies, real-estate agents, and informa-
2:
INTERPRETING AND UNDERSTANDING I N FORMATION
tion providers to make loan tracking elec tronic, further reducing paper. The mortgage loan application process involves customers, information, statistical analysis, decision makers and a variety of organizations. It is a vivid example of how to apply different kinds of technology to support a complex task.
by facts. Our formal education provides a great deal of explicit knowledge. This text is an example of an attempt to present explicit knowledge to you, knowledge about information technology and how to manage it in an organization. Tacit knowledge is something we understand but have difficulty explaining. A good ex ample of tacit knowledge is the ability to ride a bicycle. Many people can ride a bicycle, but it is very hard to explain in words to someone how to master this skill; our knowledge about bike riding is tacit. By internalizing explicit knowledge, we turn it into tacit knowledge. If you are able to articulate tacit knowledge, you may be able to convert it to explicit knowledge for others to use. How do companies acquire knowledge? The most obvious way is through expe rience, working with products, services, customers and suppliers. Knowledge often comes from beginning to understand cause and effect relationships. Almost everything that one does in an organization presents a learning opportunity. Re search and Development departments, new product groups, engineers, and similar
33
34
PART ONE: THE ROLE OF MANAGERS I N I N FORMATION TECHNOLOGY
groups are formal efforts of the firm to create and acquire knowledge. One impor tant job for a manager is to foster the development of organizational knowledge and to create an organization that learns as it operates. The "lecision.Making Process -"'<
We have suggested that one important role of information systems is to support decision making. How do people make decisions? Problem Finding and Solving
We must be aware of a problem before we can make a decision. A problem exists when the decision maker's ideal situation differs from reality, for example, when sales are below expectations. This example corresponds to something we call dis turbance handling; the manager discovers a discrepancy between the ideal model and reality, and attempts to find some way to eliminate the discrepancy. After noting the existence of a problem, the decision maker must decide what caused it. Are inventories up? Is the advertising budget too low? After determin ing the cause or causes, the decision maker tries to solve the problem by develop ing some program to remedy the situation. There is also another type of problem finding activity undertaken by the manager who is looking for improvement projects. In this sense, the problem can be defined by asking, "What else could we be doing at the present time?" The manager is trying to anticipate problems and plan for them. The tremendous amount of information available in corporate databanks or data warehouses combined with the vast information resources of the World Wide Web on the Internet make problem finding an extremely important mana gerial activity. You must learn how to discover that a problem exists and then use the variety of resources available through computers and networks to locate data. You will use the data to both understand the problem and develop a solu tion for it. Types of Decisions
Not all decisions are alike; some involve different levels of the organization and some are more important than others. Anthony (1965) suggests that there are three broad categories of decisions made in organizations, a model still widely used today. Strategic Planning In strategic planning the decision maker develops objectives and allocates resources to obtain them. Decisions in this category are characterized by long time periods and usually involve a substantial investment and effort. The de velopment and introduction of a new product is an example of a strategic decision. Managerial Control Decisions involving managerial control concern the use of resources in the organization and often include personnel or financial problems. For example, an accountant may try to determine the reason for a difference be tween actual and budgeted costs.
CHAPTER
2:
INTERPRETING AND UNDERSTANDING I N FORMATION
Operational Control An operational control decision covers the day-to-day problems that affect the operation of the firm: What should be produced today in the factory? What items should be ordered for inventory? Who makes the preponderance of each of the three types of decisions? Anthony does not specify who handles each type of decision. However, from the nature of the problems, we suspect that top managers in the organization would spend more time on strategic decision making than supervisors, and supervisors would be more concerned with operational decisions.
HOW DO INDIVIDUALS MAKE DECISIONS? Stages in the Decision.Making Process
In finding and solving a problem, the decision maker faces myriad decision cycles. What is the problem, what is its cause, what additional data are needed, and how should the solution be implemented? Each of these major steps in solving a prob lem involves the solution of subproblems. The Nobel laureate, Herbert Simon ( 1965), suggests a series of descriptive stages for decision making to help understand the decision process. The first stage is defined as intelligence, which determines that a problem exists. The decision maker must become aware of a problem and gather data about it. We have de scribed this stage as problem finding or identification. During the design stage, the problem solver tries to develop a set of alterna tive solutions. The problem solver asks what approaches are available to solve the problem and evaluates each one. In the choice stage, the decision maker se lects one of the solutions. If all the alternatives are evaluated well, the choice stage is usually the simplest one to execute. We should also add a stage to Simon's modeL called implementation in which we ensure that the solution is carried out. A more elaborate model of the decision-making process is found in Figure 2-3 (Slade 1 992). First, a decision maker must recognize that a decision needs to be made. Although this observation probably sounds obvious, there have been many examples of individuals who ignored the need for decisions. Several U.S. presi dents have been criticized for a failure to address key problems. It is likely that one of them lost his reelection bid because he failed to recognize that decisions were needed on domestic policies as well as on foreign affairs. Next the decision maker must identify alternatives, a process similar to the de sign stage in Simon's model of decision making. For routine or repetitive deci sions, the decision maker may be able to simply choose the usual action. When sales of a particular product are up, there may be a standard rule that says to re order a certain quantity of new products for every increase of one hundred units in sales. Most of the time, however, the decision maker will have to evaluate the al ternatives identified in the previous step. Somehow the decision maker must rate the alternatives on some basis; he or she then chooses the most attractive (or in some cases the least unattractive) alternative.
35
36
PART ONE: THE ROLE OF MANAGERS IN I N FORMATION TECHNOLOGY
Hertz and Avis are arch rivals in the car rental business. Both companies have in troduced handheld computer terminals so that a service representative can check in a returning car before the customer has had a chance to get out of the vehicle. Each company has taken a slightly different ap proach to providing this additional customer service. When a rental return comes i nto the Avis lot, the service rep resentative ap proaches the car and enters the Avis regis tration number, found on the rear window, into a portable terminal that he or she car ries on a shoulder strap. The terminal is linked locally to the Avis Wizard mainframe reservation system through the FM radio band. The Wizard system currently handles more than 8000 terminals around the world. The mainframe system retrieves the infor mation on the rental and displays the cus tomer's name. The service representative obtains the odometer reading and gas tank level, and enters the data into the portable terminal. Then the mainframe computes the bill, and the terminal prints it for the cus tomer. The entire operation takes one to two minutes.
The Hertz system offers the same ser vice, but the portable terminal is entirely self contained; it is not linked to the central com puter. The lack of a mainframe link means that the service representative must perform a number of calculations before printing a re ceipt. He or she must enter information that is already stored on the mainframe. Later, the data must be manually reentered into the main Hertz computer network. Has either firm gained a competitive ad vantage with these systems? The answer may be "yes, temporarily." It was relatively easy for other rental car firms to copy the technology since this innovation could not be protected legally. Certainly the customer benefits with extremely rapid rental-car re turns. Hertz has extended the technology to let members of its special club pick up a car without stopping at a counter (given a prior reservation). In this highly competitive indus try, firms may gain a temporary advantage until others catch up, but it is generally easy for the largest companies to copy each other's innovations. I n the end, it is likely to be the customer who wins while the rental car companies continue to seek an elusive competitive edge.
This stage in the Slade model corresponds to Simon's choice stage. As Figure 2-3 suggests, the highest-ranked alternative may still be unacceptable. The decision maker must try to generate new alternatives. If the situation is hopeless, the deci sion maker may abandon the problem. In most organizational settings, this last course of action is not acceptable or is certainly not encouraged. Once the decision maker has made a choice, it is necessary to implement it, that is, to effect the choice. Many managers and leaders have been faulted, not because they made bad decisions, but because they failed to take the action necessary to implement them. Implementation is often difficult for managers because they have to act through others. The individuals charged with implementation may not be committed to the decision or may have reasons to subvert it. The discussion so far makes it appear that people are confronted with a clear decision problem and take action within a short period of time. Our recent re search suggests that many decisions may actually be made over a long period of
CHAPTER 2: INTERPRETING AND UNDERSTANDING I N FORMATION
FIGURE 2·3
Slade's model of the decision-making process.
time. In one company we studied, the decision to develop a new use of technology took over six months as a group of managers discussed different options. The process of identifying a new option occurred when the managers rejected an ear lier option. At least in this instance, the decision makers did not identify all alter natives and then select one at a single point in time. Rather the decision turned into a series of explorations of options and a growing consensus on the best alter native to choose. Making a decision can be a complex undertaking; however, decisions are what determine the direction of our lives and our organizations. Information systems, among other roles, help provide information for decision making. A good exam ple of the use of technology to support decision making comes from Frito-Lay. At Frito-Lay, the large manufacturer of snack foods, district managers are able to use technology to study sales of individual products at specific stores. The manager can see exactly what products sold in what package sizes at a specific 7-1 1 in, say, Dallas, Texas ! The company built analysis tools to sift through tremendously detailed transactions data that it collects as a routine part of sales to grocery stores and other snack food vendors. The manager reviews competitors' sales and
37
38
PART ONE: THE ROLE OF MANAGERS IN I N FORMATION TECHNOLOGY
Delivery firms started in business to trans port goods. However, as more firms out source, these firms are expand i n g their original charters; they no longer provide transportation, they provide services. Fed eral Express takes computer orders over the phone for a computer manufacturer and then delivers the computers. Ryder Sys tems carries tractor repair kits for farmers and assembles the parts in each kit. These logistics firms can become the entire oper ating division of a company. As one com mentator said, "All you need to own is the label and they will do everything else." This little-known business is one of the fastest growing; it has over $30 billion a year in revenue. The big operators with estimates of their outsourcing business include Menlo Logis tics ($456 m i l l i o n ) , S c h n e i d e r National
($800 m i l l ion) , and U P S ($600 m i l l i o n ) . Some examples indicate how important lo gistics firms are to their customers. Xerox lets Ryder put some parts on copy ma c h i n e s . Ryder e m p l oyees d e l i v e r t h e copiers, set them u p , and explain how they work. Menlo workers pump up Nike's bas ketballs, soccer balls, and footballs since they ship better partially inflated. For some customers, Ryder puts the balls in pack ages and attaches the price tags. Communications technologies help these logistics companies provide the kind of ser vice necessary to satisfy the companies who outsource to them and their customers. If you understand your supply chain and can describe the decisions and processes in volved, then an outsourcer may be able to provide superior service at a lower cost than the "do-it-yourself" option.
promotions, and makes decisions on advertising and production. Production man agers make further decisions on the purchase of raw materials and factory sched ules. Frito-Lay has a sophisticated person-machine system to support operational decision making and planning. THE INFLUENCE OF THE ORGANIZATION
We have been discussing how individuals make decisions. In most organiza tions, groups of individuals are involved in making decisions. How does this group finally reach a consensus and make a decision that commits the entire firm? We all have observed different organizations in action and wondered how deci sions are made. There are a number of ways to classify organizations. Probably the best known form is the bureaucracy. Most universities, government agencies, and many large organizations fall into this category. Bureaucracies are characterized by a large number of management layers. There are many rules and procedures to protect individuals; if you follow the procedures, how can you be wrong? Bureau cracies try to survive and to minimize uncertainty; members of these organizations stress job security. We would expect decisions in bureaucracies to be conservative and require modest changes to existing procedures.
CHAPTER
2:
INTERPRETING AND UNDERSTANDING I N FORMATION
The charismatic organization is dominated by a strong leader. This individual sets the goals of the firm and tends to make all decisions. His or her decisions are hard to predict because this kind of leader often does not reveal plans to the rest of the organization. It is safe to say that the leader is likely to make the decision that subordinates then execute. The adaptive organization tries to respond quickly to its environment. The or ganization stresses rapid response times and does not have a large number of lay ers of management. A small group of decision makers analyze data and come to decisions quickly. Although there are many other types of organizations, our main point is that individuals usually make decisions in the context of some organization. It is clear that most decisions are not entirely rational as advocated by an economist. People are not always able to examine all alternatives and choose a course that maximizes the value of some outcome. The nature of the organization will influ ence the decision and the kind of information that people making the decision require. A SCENARIO FOR THE NOT·TOO·DISTANT FUTURE
How will managers in the future solve problems and make decisions? What will the impact of technology be on you as an individual? A scenario, adapted from Jarvenpaa and Ives ( 1994), suggests how you are likely to work in the future. The landing gear of the 787 came up as Tara Rodgers in seat 6B linked her per sonal assistant to an onboard computer built into the armrest of her seat. The dis play screen on the back of the seat in front of her was larger and had a higher reso lution than the screen on Tara's personal assistant. It also provided access to the airline's electronic amenities. Tara tuned into the airline's audio system, which gave her capabilities similar to those of her personal assistant including connection to inflight entertainment, the ability to listen to ground control conversations, and special circuitry to eliminate the plane's background noise. Tara touched an icon on the screen in front of her to view the in-flight service menu. She canceled dinner and eliminated nonessential messages from flight per sonnel. (Tara had taken the flight many times before and did not want the captain's sightseeing instructions.) She asked for a glass of port to be delivered in two hours. She did not expect her electronic documents to attract the attention of the EUC's customs and immigration systems, but she authorized the system to wake her if an onboard interview with immigration officials was requested. By speaking softly into a microphone plugged into the arm rest, Tara completed her customs declaration. The airline's computers had already entered the flight number, date, and other details of the trip. Tara barely noticed the soft, classical music that she had chosen as background for her audio system. Her personal profile, stored in her assistant, or possibly the airline's frequent flyer database, had chosen her type of music and preset the vol ume based on her personal preferences. This profile would also suggest that her morning coffee be served with cream and no sugar.
39
40
PART ONE: THE ROLE OF MANAGERS IN I N FORMATION TECH NOLOGY
Tara touched another icon to make arrangements for her brief stay in Oxford. Her trip from New York was sudden, and she had not made hotel reservations. The elec tronic reservation agent her firm subscribed to had booked her into a charming guest house she had liked during her last visit to Oxford. Using the travel agents' virtual reality simulator, she wandered into the rooms with open doors (available this evening) and selected the one with the best view of the college. She also could have looked at a short video segment showing where to meet the car that would take her from Heathrow to Oxford, after booking the car electronically. Had she been closer to London, she could have looked at a prerecorded introduction to her driver. The airline's computer predicted an on-time arrival with 95 percent certainty, and Tara began the work she wanted to complete before trying to get some sleep. First she called her husband and watched her children at play in their family room. Back at work, Tara touched a key to activate her electronic messaging system and listened again to the message from the senior partner of Worldwide who had sent her off on this sudden trip. "Tara, this morning I received a message from London from Professor Locke at Templeton College, Oxford. Locke has worked closely with our U.K. and European offices on a number of projects; London believes he has the in side track on a promising opportunity, but we have to move quickly. "The prospective customer is Empire Software, a company that specializes in the production of integrated software systems for the international freight busi ness. Sir Phillip Knight, CEO of Empire, is in residence at Templeton College for a three-day forum. Over coffee, Knight expressed a concern to Locke that his firm is not taking advantage of the advances in software engineering and that his man agement team is poorly prepared to respond to competitive threats. Knight was very interested in some kind of customized educational program for the firm's top 100 employees. Locke has set up a meeting with Knight for tomorrow afternoon at
CHAPTER 2: INTERPRETING AND UNDERSTANDING INFORMATION
Templeton to talk more. Locke thinks that if we move quickly, we might be able to land this job without Empire going through a competitive bidding process. Locke would like our help in putting together the educational program. "Tara, you worked with Knight five years ago on a project when he ran devel opment at Dover Software and you were with that awful competitor of ours. When the UK office ran a search, the identifier system came up with your name because of that job and your knowledge of the software industry. "Empire is a high-growth company that has been very profitable. Locke thinks there will be follow-up business if we get the job. Knight feels Empire is in a bad position to operate globally; he thinks software engineering will help Empire com pete as well as relying on Eastern European software houses for assistance. Knight likes the kind of wholesale organizational change program Locke has been talking about in the Templeton seminar. I've checked our customer database and I find that we have not done much with Empire, though we have a couple of engage ments with them in Asia and Europe. We have no U.S. projects with them. "I checked your availability for the next two days and have started to reassign your responsibilities to other associates. Jerry Wright is your contact from the London of fice; he has worked with Locke in the past, but doesn't know Empire or Knight. I contacted Mary Ellen Smith, who is a doctoral student at UC Irvine, to be your spe cial research assistant. She will be at your disposal for the next 48 hours working out of her home. You can ask her to look through our files and external databases to pull together a brief on Empire, their competitors, the industry, and so on." Tara listened to a forwarded message from Professor Locke and Jerry Wright. She checked corporate records for a profile on Wright; his specialty was working on projects that required pulling together diverse resources from the Worldwide Group. He was highly motivated and would perform, though he might be occa sionally a bit brusque and overly task-oriented. Wright had spoken to Locke and forwarded his notes to Tara. Wright had pro vided the names of several Empire people in the U.S. and Europe that Worldwide was working with. Tara saw that one of these projects pertained to software devel opment productivity. She linked to Worldwide's central databank to review reports on that project. Tara found a presentation prepared and delivered to a technical di rections steering committee in Tokyo three months earlier. The findings were simi lar to Knight's concerns about productivity and global reach. One recommenda tion was a call for a management education program and an examination of locating a development group in the Pacific Rim. Tara sent an urgent message to the Tokyo partner who had worked with Empire on this project. He was vacationing on a cruise ship in the Caribbean, but the mes saging system located him and forwarded the message in English and Japanese. Tara attached the correspondence relating to her current project and asked for a quick update and one-minute summary of the original findings that she could use the next day. Then she downloaded the complete text of the Tokyo presentation to her personal assistant and highlighted the key sections she would use tomorrow if she did not find better information. Finally, she forwarded the results of her work to Wright in London.
41
42
PART ONE: THE ROLE OF MANAGERS IN I N FORMATION TECHNOLOGY
By this time, Mary Ellen Smith had forwarded Tara a dossier on Empire. Smith had produced a rich assortment of documents on Empire as well as a strong overview report. Using a global paging service, Tara set up a conference call with Smith and an executive education specialist in Boston. Tara wanted a list of names from the firm, from colleges, and from independent consultants of people qualified to participate in a program of this type. She needed data on fees, availability, areas of specialty, and participant evaluations from their past programs. She also wanted to see video clips of each candidate performing in front of an executive audience. Smith said she would use her electronic agent to search through faculty exper tise files in the top tier business schools around the world. Tara asked Smith to identify five to ten top candidates and the education specialist to look for several possible venues for the program. Several of the experts would probably remain at their home base and provide instruction through audio, video, and computer links to the conference site. Checking through uploaded files from other Worldwide per sonal assistants, she found that Knight had a summer home in Bermuda and sug gested that as one possible seminar location. Before signing off, the education consultant downloaded a multimedia presen tation to Tara's personal assistant. Worldwide had recently used this presentation to sell a similar educational project to another client; she could save time by using this "boilerplate" for tomorrow's meeting. Tara asked the assistant to identify an initial list of individuals who could con tribute to the program. Using her firm's database, she checked on their availability over the next six months and watched video clips of several instructors working with executive audiences. She called one presenter in Oregon to ask if she could use his video clip in her presentation tomorrow. Tara contacted Kolormagic, a firm that provided worldwide graphics work for its clients. Headquartered in Singapore, the company maintained a group of graph ics artists around the world who could provide consistent, high-quality multimedia presentations for clients. Singapore offered inducements for the company to locate there, including its superior technology infrastructure. Kolormagic arranged for an artist on Maui to work with Tara. She checked pre vious work from this artist in the Worldwide database and was satisfied with his work. She forwarded to the artist logos from Worldwide and Empire, names, titles, pictures, and links to the previous multimedia demonstration she had reviewed. She spent the next hour discussing the presentation with the artist. The artist prom ised a rough presentation by the time Tara reached Oxford. Locke, Wright, and the Japanese partner in the Caribbean would all be able to review the presentation be fore it was delivered. Tara completed a summary of her activities and forwarded it to Wright and the Worldwide database. She set a wakeup call for 45 minutes before landing. As the flight attendant arrived with the glass of port, she checked Knight's personal pro file from her one previous contact with him; she retrieved the name of his favorite . wine; and forwarded it to Wright in London. Now it was time for some sleep. Is this scenario realistic? Much of the technology described here exists today; The advances that are necessary to make the scenario feasible will come from low ering communications costs and increasing capacities for transferring information.
CHAPTER
2:
INTERPRETING AND UNDERSTANDING INFORMATION
Given growing competition in the communications industry, it is likely that you will enjoy the use of the technology described above during your career. CHAPTER SUMMARY
1. A major role for IT is providing information, and frequently this information is used for making decisions in an organization. 2. It is important to understand how individuals interpret information and make decisions using it, as well as how organizations influence each individual's in terpretation of information. 3. Different individuals are likely to have differing interpretations of the same data; they may both begin with the same data but come to entirely different conclusions on its meaning and on the appropriate action to take. 4. A variety of interpretations of data raise a major challenge for management in the organization and for those who design information systems. 5. Information has a number of characteristics. The type of information needed for different kinds of decisions differs; for example, strategic planning uses different information than operational control or managerial control. 6. Schools frequently focus on teaching students techniques for solving well defined problems; it is important to learn how to find problems and under stand their cause. 7. Knowledge is information plus know-how. Knowledge is an important, strate gic resource for the firm, and managers need to see that the firm learns from its experiences. Information technology can help support the acquisition and sharing of knowledge worldwide. IMPLICATIONS FOR MANAGEMENT
Information is a tricky substance. You can give it away and still keep it for yourself. If someone already knows the information, giving it to them again does not provide any benefits. The same information can have widely differing impacts on different people. Countries with advanced economies more and more use information to add value to products and services. As a manager you will work in an information-rich environment and you will use and communicate information in a variety of ways. Try to keep in mind the unusual characteristics of information, especially the factors that influence how different people come up with radically different interpretations of the same information. If you can turn information into knowledge, you should be able to use the knowledge as a strategic resource for competitive purposes. KEY WORDS
Accuracy Adaptive Analytic Bureaucracy Charismatic
43
44
PART ONE: THE ROLE OF MANAGERS I N INFORMATION TECHNOLOGY
Choice Cognitive style Data warehouse Deductively Design Detail Disturbance handling Explicit External Heuristic Historical Implementation Inductively Intelligence Internal Knowledge Managerial control Operational control Problem finding Real time Strategic planning Structured Summary Surprise Tacit RECOMMENDED READING Banker, R.; R. Kauffman; and M. Mahmood. Strategic Information Technology Manage ment. Harrisburg, PA: Idea Group Publishing, 1993. (An interesting and stimulating col lection of articles about the strategic use of technology.) Denning, P.; and R. Metcalfe. Beyond Calculation: The Next Fifty Years of Computing. New York: Copernicus Springer-Verlag, 1997. (A collection of articles by noted experts in technology on what the future holds.) Nonaka, I. "A Dynamic Theory of Organizational Knowledge Creation," Organization Sci ence, 5, No. 1 (1994), pp. 14--37. (A somewhat complex article that defines knowledge and its importance to the firm.) Parker, M. M. Strategic Transformation and Information Technology. Englewood Cliffs, NJ: Prentice Hall, 1996. (An up-to-date look at the way technology changes organiza tions and the opportunities it provides managers.)
DISCUSSION QUESTIONS 1. What
alternative definitions for information can you propose? do you think selective perception is? How does it affect the design and use of in formation systems?
2. What
CHAPTER 2: INTERPRETING AND UNDERSTANDING I N FORMATION
3. Why
is information more than just data? How would you measure cognitive style? How does this concept help in the interpreta tion of information and the design of information systems? 5. Can an organization skew the information it develops and uses? 6. How can different interpretations of information lead to conflict? How can this conflict be resolved? 7. Develop procedures to elicit and define information needs for making a decision. How could you implement your plan? What are the problems? 8. How does the importance of a decision reflect itself in the user's interpretation of information? 9. Would you expect an analytical decision maker to be more favorably disposed toward a spreadsheet model than a heuristic one? Why or why not? 10. Pounds, a former dean of MIT's Sloan School, suggests that a problem exists when the decision maker' s normative model of what should be conflicts with reality. How does this normative model relate to our information interpretation model? Are the two mod els completely independent? 11. Can the same information system be used by more than one decision maker? 12. How can we custom tailor information systems to suit different decision makers at a reasonable cost? 13. Examine for bias one particular indicator with which you are familiar. For example, how valid an indicator of reliability is a grade point average? 14. What differentiates knowledge from information? 15. Are there information systems that deal with decisions or processes outside Anthony' s categories? What types o f systems are these? 16. What are the most frequent indicators for evaluating the performance of lower, middle, and top managers? 17. How does an organization acquire and disseminate knowledge? 18. How can knowledge become a competitive resource for the firm? 4.
CHAPTER 2 PROJECT
The Adm issi ons Decision One of the most feared decision processes, at least by students, is the admissions decision that colleges and universities make. This decision determines whether a student will be accepted and often involves a second decision on the possible award of financial aid. Drawing on your experiences applying to schools, describe the information that is used in making the decision. What data were you asked to supply? What information came from external sources? What are the characteris tics of the information? Use one of the decision-making models in the text, for example, Figure 2-3, to describe how the admissions committee processes information and makes a deci sion. How should this committee interpret information? Should the interpretation be the same for each student, or are there situations in which some information should weigh more heavily for a candidate?
45
CHAPTER 3
I
nology
l1li
p
I
Outline Frameworks for Information Technology
Decision-Oriented Frameworks A Synthesized Framework Adding Organizations and Decisions to a Framework A Framework Based on IT
Changing Technology and Applications Processing Transactions Decision Support, Executive IS, and Expert Systems Knowledge Work Support Supporting Groups and Cooperative Work-Groupware Interorganizational Systems Key Technologies: Communications, Networking, and Database A More Contemporary Framework The Basics of Information Systems Some Generic Types of Systems Using Different Types of Technology Is There Value in IT?
Investment Opportunities Matrix What Is Value? The Case of Chrysler
46
CHAPTER 3: INFORMATION TECHNOLOGY IN PERSPECTIVE
Focus on Change
The frameworks in this chapter are concerned with the way individuals and orga nizations apply information technology. They help us understand how technology contributes to individuals and to their workplaces. We also seek to answer the question of where to find value from an investment in IT. We observe a large num ber of changes from technology, as evidenced in the discussion of Chrysler Corpo ration. Information technology enabled Chrysler to implement two programs: lean production and just-in-time inventory. The results of all these changes have been to complete Chrysler's rescue and return it to profitability. The company's success has been such that in 1998-1999, it merged with Mercedes Benz to form a power ful, worldwide automotive giant. A framework is a conceptual model that helps us understand and communicate about information systems. Information technology covers a vast array of topics; you need a way of thinking about issues in the field to manage IT successfully. A large number of systems have failed to produce benefits because designers did not understand the role of technology in the organization nor the requirements of sys tem users. The frameworks discussed in this chapter should help shape the way you think about this broad field called information technology.
FRAMEWORKS FOR INFORMATION TECHNOLOGY
A framework provides you with a way to organize your thoughts and analyze a problem. There is no one theory of information systems and technology, though a user or designer of a system needs some conceptual model of an information sys tem. In this text we present several different approaches to frameworks and adopt one for purposes of discussion. It is not essential that everyone adopt the frame work we use here. It is important, however, for you to have some conceptual model when making decisions pertaining to these systems. Decision-Oriented Frameworks
In the previous chapter we discussed the decision-making stages of intelligence, design, and choice proposed by Simon ( 1 965). Anthony ( 1 965) is concerned with the purpose of decision-making activities, whereas Simon stresses methods and techniques. In addition to the stages in Chapter 2, Simon proposes that there are two types of decisions: programmed and nonprogrammed. Programmed decisions are routine and repetitive and require little time spent in the design stage. Entering data into a spreadsheet program is an example of a programmed activity. Nonpro grammed decisions are novel and unstructured, for example, deciding on the mar keting mix for a set of products. There is no one solution, and much time is spent in design since the problem has probably not appeared before. Clearly, few deci sions are at one polar extreme or the other; most fall along a continuum between programmed and nonprogrammed.
47
48
PART ONE: THE ROLE OF MANAGERS IN INFORMATION TECHNOLOGY
Different types of decision-making technology are suitable for attacking each type of problem. Programmed decisions have traditionally been made by habit, by clerical procedures, or with other accepted tools. More modern techniques for solving programmed decisions involve operations research, mathematical analysis, modeling, and simulation. Nonprogrammed decisions tend to be solved through judgment, intuition, and rules of thumb. Over time, we expect to see new technology providing more pro gramming for nonprogrammed decisions; that is, decisions will tend to move to ward the more programmed pole of the continuum. A Synthesized Framework
A framework synthesizing the work of Anthony and Simon (see Chapter 2) is very appealing because it helps us classify a variety of systems (Gorry and Scott Mor ton, 197 1). Table 3- 1 classifies Anthony's decision types from operational control to strategic planning on a scale of structured to unstructured. (Gorry and Scott Morton feel that structured and unstructured are more appropriate terms than pro grammed and nonprogrammed. ) In a structured decision, the three phases-intelligence, design, and choice are fully structured. In an unstructured decision, all three phases are unstructured. Any decision in between the two extremes is semistructured. As in Simon's frame work, the line between structured and unstructured decisions shifts over time as new decision techniques are developed and applied to unstructured problems. From Table 3-1 , it appears that many information systems have attacked prob lems in the structured, operational control cell. These problems are similar in many organizations and are among the most easily understood. It is easier to mechanize these decisions and to predict and achieve cost savings for them than less structured decisions or strategic-planning decisions. Since operational systems are important to the daily functioning of the firm, they are high-priority applications. Many individuals in the information systems field believe that unstructured de cisions have the greatest payoff for the organization. The development of systems for unstructured problems is a major challenge and is undoubtedly more risky than
TABLE 3·1 THE GORRY·SCOTT MORTON FRAMEWORK
Classification
Operational control
Management control
Strategic planning
Structured
Order processing, accounts payable
Budgets, personnel reports
Warehouse location, transportation mode mix
Semistructured
Inventory control, production planning
Analysis of variance
Introduction of new product
Unstructured
Cash management
Management of personnel
Planning for R&D
CHAPTER 3: I N FORMATION TECH NOLOGY IN PERSPECTIVE
the development of comparable systems for structured problems. The goals and design techniques for unstructured decisions differ from those for structured ones. In the structured case, the goal of an information system is usually to improve the processing of information. In an unstructured situation, the goal of the information system is more likely to improve the organization and presentation of information inputs to the decision maker. We include a large number of technology applications in this text. Organiza tions and individuals have been extremely creative in developing new uses for IT. Huge computer complexes support airline reservation systems, for example, while managers in a variety of fields use personal computers for decision support and analysis. A framework such as the Gorry-Scott Morton model can aid our thinking in studying different kinds of systems. What kind of management support does the system provide? What is the nature of the problem? Adding Organizations and Decisions to a Framework
An expanded framework in light of new IT applications based on the work of Harold Leavitt provides additional insights (Stohr and Konsynski, 1992). Figure 3-1 shows that an organization develops some internal structure so the people who work in the organization can perform their tasks. People undertake these tasks so the firm can accomplish its mission or purpose, such as manufacturing and selling a product or providing a service. This framework separates information technology from the
FIGURE 3·1
Modified Leavitt model.
49
50
PART ONE: THE ROLE OF MANAGERS IN INFORMATION TECHNOLOGY
other technology in the firm because Stohr and Konsynski believe IT has become central in linking all parts of the organization and helping it accomplish its tasks. A significant feature of the framework is the idea that a change in one compo nent is likely to cause changes in others. Chapter 4 explores the use of IT to design new kinds of organizations. A change in the environment may force the company to restructure itself-change its tasks and even the number of people who are asso ciated with it. Many firms were "restructured" and "downsized" or reduced their numbers of employees to improve profits in the 1990s. Changes in world politics are causing the U.S. government to reallocate defense expenditures. This change in the environment is having a dramatic effect on the defense industry. Table 3-2 provides more detail on the factors in each component of the frame work. For example, there are many ways to structure an organization and there are
TABLE 3-2 ELABORATION OF THE FRAMEWORK
Organizational structure 1 . Formal organizational structure (hierarchy, teams) 2. Corporate rOles, responsibilities 3. Corporate goalS, strategy, pOlicies 4. Informal communication structure, culture 5. Formal and informal decision processing mechanisms People 1 . Intrinsic factors: age, education, knowledge, technical skillS, managerial skillS, leadership skills, personality types, cognitive styles 2. Motivational factors: personal objectives, utilities 3. Interpersonal factors: corporate POlitical affiliations, friends, alliances, influence 4. Extrinsic factors: roles, responsibilities, position in organization Tasks 1 . Management categories: scanning, organizing, motivating, monitoring, controlling 2. Repetitive activities, non repetitive activities 3. Individual level: learning, communicating, deciding, performing Technology 1 . Physical asset structure: land, buildings, plant, equipment 2. Financial asset structure 3. Geographic distribution of resources Information technology 1 . Databases, storage devices 2. Computational capabilities, software 3. Communication capabilities, networks 4. Knowledge bases 5. Information architecture 6. Environment 7. National and global economy 8. Customers, suppliers, competitors 9. Products, substitutes 1 0. TechnOlogical innovation
CHAPTER
3:
I N FORMATION TECHNOLOGY IN PERSPECTIVE
a large number of influences on people. These factors are important to the decision processes in the organization. They affect the way we can use information technol ogy to help the organization achieve its objectives. A FRAMEWORK BASED ON IT Changing Technology and Applications
The purpose of employing any technology is to obtain an advantage over old ways of doing business. The frameworks above were developed around early information systems that made use first of computer and then communications technology. These early frameworks can be improved by taking into account the explosion of worldwide computer networking. Individuals and organizations have shown tremendous initiative in finding ways to apply information technology to improve their operations, gain a competitive advantage, provide personal productivity tools for employees, and even change the very structure of the organization. IT today is a vehicle for making substantial changes in organizations, markets, and the economy. Processing Transactions
Today most transactions processing systems operate on-line, and a number of computer vendors compete for the business of providing hardware and software for on-line transactions processing (OLTP) systems. Whenever a customer in a store uses a credit card for a purchase above a certain amount, the merchant places the card in a reader that sends data recorded on the magnetic strip on the back of
Vanity Fair manufactures a variety of cloth ing products, from Lee and Wrangler jeans to women's undergarments. The company is a leader in computerized market-response systems, systems that restock a retailer's shelves as quickly as possible. Vanity Fair often restocks within three days of an order while Levi's can take a month to supply new product. The company began by connecting its computers to those of retailers like Wal Mart and J . C . Penney . VF provides hun dreds of styles to thousands of outlets; its communications center has some 40 floor to-ceiling terminals that technicians use to control the network. Every night Wal-Mart sends data col lected on register scanners in 21 00 outlets
to Vanity Fair. VF then restocks the stores automatically based on what was sold that day. If VF has the product in stock, it is shipped the next day so that within three days the new jeans are on the shelf. If the item is not in stock, the VF computer orders a replacement that is man ufactured and shipped within a week. Another advantage of this system is that the retailer only replen ishes products that are selling. Since the items in stock are what the customer wants, there are fewer clearance sales. The chair man of VF credits the system, which han dies half of its jeans orders, with giving the company the largest market share in the jeans business.
51
52
PART ON E : THE ROLE OF MANAGERS IN I N FORMATION TECH NOLOGY
the credit card to a central transactions processing computer. The merchant enters the amount of the purchase, and the computer looks up the customer's record to determine if a purchase of that amount is authorized. If so, the computer sends back an authorization number to the merchant. No matter what happens between the credit card company and the customer, the merchant is assured of receiving payment from the credit card company after following the authorization process. Modern systems initiate a transfer from the credit card company account to the merchant's account based on the authorization, so the merchant receives payment very quickly. Transactions processing systems handle vast amounts of data, much of which convey little interesting information to a manager. However, summaries of transac tions data are often useful. For example, a summary of sales by product and terri tory from a sales database could be very valuable for a marketing executive or brand manager. Today companies are creating "data warehouses" that contain huge amounts of operational data; they try to discover useful information by sift ing or "mining" these data. Transactions systems are the backbone of many infor mation systems in firms. Decision Support, Executive IS, and Expert Systems
Information technology can be used to support decision making in the organiza tion as well as process transactions. Managers running spreadsheet programs on their personal computers to decide whether to launch a new product or make a particular investment are using the computer for decision support. There are also special cases of decision-support systems eDSS) known as group DSS and execu tive information systems eElS), which are DSS designed specifically to support top management. Expert systems provide support in another fashion: They cap ture the knowledge of an expert and encode it in a computer program so the knowledge can be more widely shared. We discuss decision support systems in Chapter 2 1 and expert systems in Chapter 22. Knowledge Worker Support
Large mainframe computers rarely feature applications that enhance the productiv ity of the typical manager. One of the great appeals of personal computers is the software available for personal productivity. Office software such as spreadsheets, word processors, database packages, presentation graphics programs, and organiz ers turn a PC into a manager's workstation. Many of these same functions are portable through very small notebook computers and personal digital assistants like the Palm Pilot, devices which are capable of exchanging data with a larger personal computer. Supporting Groups and Cooperative Work-Groupware
One of the most exciting uses of technology is the support of group and cooperative work. When individuals in different locations need to communicate with each other to
CHAPTER 3: I N FORMATION TECH NOLOGY IN PERSPECTIVE
share information, a distributed network of personal computers with appropriate soft ware can provide the coordination mechanism. Consider a group of customer service staff members who answer questions about how a software package works. A net work with groupware makes it possible to record different problems and solutions and store them in a textual database so that other representatives can search the data base to find your solution when they encounter a similar problem. Groupware pro grams such as Lotus Notes perform this function. It provides electronic mail and communications and automatically updates local databases with documents that need to be shared. A development tool lets end users create new applications within Notes. Interorganizational Systems
Applications that tie two organizations together are known as interorganizational systems (lOSs). Partnerships and strategic alliances are created and enhanced with interorganizational systems. Such systems may be nothing more than e-mail con nections, or they can represent full computer-to-computer connections between customers and suppliers as one example. Interorganizational systems make possi ble virtual components in which a partner substitutes for some component of your company, such as using Federal Express to deliver your products instead of your own fleet of trucks. Key Technologies: Communications, Networking, and Database
The kinds of applications and systems described above rely heavily on three key technologies: communications, networks, and database. These technologies have developed rapidly during the last decade and are responsible for what you can ac complish with IT. Much of the information and knowledge of organizations is now stored in machine-readable databases, huge repositories of all types of corporate information. Networks tie together thousands of computers; an Internet connection makes it possible to communicate with millions of people who are connected to the World Wide Web. A More Contemporary Framework
The Gorry-Scott Morton framework has been a unifying paradigm for the infor mation systems field for three decades. But we are now confronted with many more types of systems and new technology than when this original framework was developed. The systems we have just discussed may be used by an individual, a workgroup, or the entire organization, or they may be interorganizational systems that connect one or more organizations. A useful framework for information tech nology for this text appears in Figure 3-2. As the figure illustrates, information technology supports individuals, work groups, organizations, and linkages among organizations. Individuals use this technology to help execute managerial tasks such as designing the organization, formulating corporate strategy, making decisions, and so on. The changing technology we described in the section above enables the organization to
53
54
PART ONE: THE ROLE OF MANAGERS IN IN FORMATION TECHNOLOGY
Organizations
Changing technology: Transactions processing Decision support Expert systems Group decision support systems Executive information systems Personal support systems Groupware Interorganizational systems Communications Networking Database
Managerial tasks: Structuring the organization Formulating strategy Managing and controlling Decision making Forming interorganizational relations Reporting Designing products and services Managing and designing business processes
FIGURE 3·2
A framework for IT.
develop applications to support all the tasks involved in managing the firm. The key parts of this framework are: • A focus on the organization as the most important component of the study of information technology. • The role of technology in supporting managerial tasks. • The pervasive nature of technology in the organization. You should keep this framework in mind as we learn about its various components in the rest of the text.
CHAPTER 3: INFORMATION TECHNOLOGY IN PERSPECTIVE
THE BASICS OF INFORMATION SYSTEMS Some Generic Types of Systems
Figure 3-3 illustrates three different kinds of information systems. A transac tions processing system, shown in Figure 3-3(a), processes input provided by a user, such as the fact that a client purchased a certain number of shares of AT&T. The input is first edited for errors and corrected, if necessary. For exam ple, if the person doing the input typed ATR and there is no such stock, the sys tem would ask for the data to be typed again. The input then becomes immedi ate output (a purchase confirmation for the customer) and is used to modify the database of stock records in the system. Input can also be used to request the re trieval of information stored in the system, such as the customer's entire stock portfolio. Files containing data are a major component of the information system. The files correspond to the information kept in folders, file cabinets, or notebooks in a manual information system. Files are a part of the organization's database. Infor mation may be retrieved from a file, or the file contents may be altered by modify ing, adding, or deleting data in the file. We are also interested in some type of out put from a system, which may be a short response to a request for information from a file or the result of elaborate computations. Output is produced in any of a number of different formats and modes of presentation, such as a printed report, a display on a screen, or a verbal response. Figure 3-3(b) portrays a decision-oriented system. The decision maker uses a workstation to run a decision-support system. The DSS software allows the user to retrieve data from the database. The same software might contain a model man agement subsystem allowing the user to apply different kinds of models for ana lyzing the data. The system also provides different modes for presenting the re sults of analyses to the decision maker. Figure 3-3(c) illustrates a communications-oriented system. Here there are two users who communicate through a central computer, possibly one that is owned and operated by a common carrier that provides electronic mail services. Each user operates a workstation and sends messages to a file that contains electronic mailboxes for all subscribers on the system. When user 2 connects with the central computer from his or her workstation, there is a message notifying user 2 that there is new e-mail waiting to be read. User 2 can read the mail, forward it to someone else, and/or send a reply to user 1 . Using Different Types of Technology
It is helpful to distinguish among the types of information systems according to the technology employed. In a batch system, all input is processed at one time to produce the desired output. The input data are collected and used to update the files periodically-daily, weekly, or monthly. The data are frequently out of date in this type of system because updating is periodic, but batch processing is very economical. A payroll system is an example of an application that is often oper ated in butch mode because paychecks are issued periodically. The ratio of batch
55
56
FIGURE 3·3
Three types of information systems: (a) transactions system, (b) decision system, (c) communications system.
CHAPTER 3: INFORMATION TECHNOLOGY IN PERSPECTIVE
processing to interactive processing is declining. Almost all new applications today involve interactive processing, even if they have some batch components. All applications in which a user works directly with a computer, that is, virtually everything other than batch processing, are considered to be interactive. An inquiry system can be used to process retrieval requests for information on-line. Often inquiry systems accept and edit input on-line for later updating in batch mode. This input is saved in a file and is used to update the system later. A production control system could be operated in this manner to accept input from terminals on the factory floor during the day. Then, in the evening, when the computer schedule is less heavy, the files could be updated in a batch pro cessing run. A fully on-line system actually modifies files as the information is entered from terminals. An example of an on-line system is American Airlines' SABRE reservations system, which supports tens of thousands of terminals throughout the world. A command and control system or real-time system is one in which informa tion has to be fed back instantaneously to control an operation. For example, the air traffic control system operates in real-time so the controller can see exactly where aircraft are located at any time. An InternetlIntranet application uses Internet standards to link host comput ers with user machines in a client-server architecture. The Internet can be used to access external information and send electronic mail, or it can be connected with a firm's transactions processing systems to provide information to customers or to enter into electronic commerce. The most popular architecture today is client-server throughout the organiza tion. In this architecture, a user's client workstation requests data and programs from a server, a larger computer with a great deal of storage capacity. The World Wide Web developed on the Internet because client computers could run a browser program like Netscape or Internet Explorer to access an Internet host computer. For most organizations, it has been difficult to make the transition from mainframe computers to the client-server model. Table 3-3 summarizes the types of systems and their characteristics, and pro vides an example of a typical application employing each type of technology. Note that these types of systems may be designed around a number of different kinds of hardware and software. In later chapters we shall discuss different types of architectures ranging from personal computers to massively parallel machines. IS THERE VALUE IN IT?
Managers will generally tell you that they invest carefully and expect a return from their investment. In deciding whether to make an investment, companies frequently compute the net present value (NPV) of a proposal, using an interest rate that represents a minimum acceptable return for the firm. Various observers
57
58
PART ONE: THE ROLE OF MANAGERS IN INFORMATION TECHNOLOGY
TABLE 3-3 CHARACTERISTICS AND APPLICATIONS OF DIFFERENT TECHNOLOGIES
Type of system
Characteristics
Example
Simple batch system
Updating at one pOint in time
Payroll
Inquiry
Update in batch, retrieve on-line, enter and edit data on-line
Production control with factory floor input
Fully on-line
All input, output, and updating done on-line through terminals
Reservation system
Command and control
Fully on-line and instantaneous feedback to control some process
Air Traffic Control system
Internet/Intranet
Uses Internet standards, hosts, clients, and browsers to make information available, conduct business
Federal Express Web site that lets customers check on the status of shipments themselves
Client-server
Client workstations access corporate data and applications on a server
Analyzing sales data
have criticized information technology for not providing a satisfactory return on investment. How valid is this criticism? Investment Opportunities Matrix Table 3-4 presents the Investment Opportunities Matrix, which shows some of the different types of IT investments. The first column of the table describes the kind of investment in technology that one can undertake. The second column provides an example, and the third offers comments on this investment type. The fourth col umn, "upside," discusses the possibility that you will obtain much larger return than predicted. An extraordinary return might result because an investment worked much better than expected, or a product with IT as a component became extremely popular like the Merrill Lynch Cash Management Account in the 1 980s or the more recent MCI Friends and Family Program. The last column in Table 3-4 provides an estimate of the probability that there will be a return from the investment in this type of system. If the estimated probability here is .5, that means there is a 50 percent chance that you will get a return from this type of investment. The column presents ranges because the return depends on the specific IT investment you are planning to make. The second number in the column is my estimate for what you can expect in general for an investment in this type of IT. The probabilities are subjective; they are estimated from seeing a large number of applications and descriptions of IT investments. Providing numbers like this is controversial; the objective is not to convince you that a particular probability esti mate is the correct number. The point is that there is not the same likelihood of a
return from each IT investment.
CHAPTER 3: I N FORMATION TECHNOLOGY IN PERSPECTIVE
59
TABLE 3-4 IT INVESTMENT OPPORTUNITIES MATRIX Probability of return
Type of investment
Example
Comments
Upside
Infrastructure
Wide Area Network
Support current business-may allow for future investments
Little itself, but allows new programs
Required: no return Managerial control
OSHA reporting system, budgets
A cost of doing business
Almost none
No other way to do the job
Computerized reservations system, Air Traffic Control
Enable new task or process, provide better customer service, new products
Could gain more than forecast
.5 to 1 .0 (.75)
Direct return from IT
Merrill Lynch, Chrysler
Structu red, cost! benefit and NPV appropriate
A little if you can build on the investment
.7 to 1 .0 (.9)
Indirect returns
CRS in travel agencies
Potential for considerable return, but indirect benefits hard to estimate
Could be substantial future benefits
o to 1 .0
Competitive necessity
Bank ATMs, much EDI Electronic commerce
Need the system to compete in the business; what is the cost of not investing in technology?
Very little if you are following the industry
o to 1 .0
Strategic application
Baxter, Merrill Lynch CMA
High risk-high potential; may be able to estimate return only after implementation
A high potential
o to 1 .0
Virtual organizations, Oticon
Must be combined with changes in management philosophy; good for fast-response organization-risky to change structure, but high potential rewards
A high potential
Transformational IT
.2 to 1 .0 (.5)
O to .5 (.2)
(.5)
(.2)
(.5)
o to 1 .0
(.5)
Source: H. C . Lucas, Jr., Information Technology and the Productivity Paradox: Assessing the Value of Investing in IT. New York: Oxford University Press, 1 999.
60
PART ONE: THE ROLE OF MANAGERS IN I N FORMATION TECHNOLOGY
Infrastructure. Our transportation infrastructure consists of roads, interstate highways, rail lines, and airports, to name a few components. Infrastructure tends to be expensive and not terribly exciting, but extremely important. Transportation infrastructure lets the economy function by moving goods from where they are produced to where they are consumed. Technology today requires an underlying infrastructure, but experts differ as to what belongs in infrastructure. Most of us would include computers, communications networks, and some general purpose software such as database management systems. Given the rapid advance of tech nology, we would expect an organization to have a large number of desktop work stations (NationsBank has more computers than employees according to its chair man), computers that are dedicated as file servers, computers that process transactions, and networks that link computers in the organization together. There should also be connections to the Internet. Increasingly, things like a home page on the Web and corporate information posted to Web pages constitute a minimal infrastructure. Groupware such as Lotus Notes might also be considered a part of infrastructure. What do you gain from investments in infrastructure? For many firms, informa tion technology is vital to running the business. Banks, brokerage firms, and others that deal in services and transactions have long used technology as part of their production effort. Universities have a tremendous investment in infrastructure to provide technology for students and faculty. Infrastructure, then, is almost a re quirement for many organizations to be in business today.
CHAPTER 3: INFORMATION TECHNOLOGY IN PERSPECTIVE
On the upside, infrastructure may also enable you to take advantage of some opportunity that arises. The firm that develops the capability to set up a Web page and post information to it is in a good position to create an Intranet within the company. It is also better prepared for electronic commerce since it already has a presence on the Web. It can be argued that infrastructure investment is done as much for the opportunities it opens up as for the immediate needs it satisfies. My estimate is that there is about a 50 percent chance of getting a payoff that you can measure from infrastructure investments. However, like highways, rail roads, and the air travel system, these kinds of investments are crucial to enabling you to do business. You may choose to make more than the minimum investment here, but that decision will be justified more on faith than hard numbers. Required. How can a system be required? One source of many requirements is the government. Companies have developed applications to satisfy federal or state requirements, particularly for organizations like the Occupational Safety and Health Administration (OSHA). It is hard to see a return on this kind of invest ment, except possibly cost avoidance since there may be a fine associated with noncompliance. When the automakers first began to insist that their suppliers be able to accept orders electronically, there was little choice for vendors if they wanted to do busi ness with Detroit. If you demanded an economic justification, you could deter mine the value of sales to the auto companies and compare that with the cost of ED!. However, most managers would probably not consider noncompliance unless they sold very little to Detroit. Investing in this technology was a cost of doing
business. Other kinds of required systems include managerial control and applications like budgeting and accounting. IT used for these purposes is important in running the company, but it is very hard to find a great deal of value, either in cost savings or revenue generation, from investing in managerial control technology. If you insist on economic justification, then the relevant numbers are likely to be opportunity costs. What is the cost of not making the investment rather than what do we save or gain from this application? The upside here is almost none since you will probably invest in this technology and move on. No Other Way. We have mentioned computerized reservations systems, but there are many more applications of technology that would not be feasible manually. Once you are on the plane, the Air Traffic Control (ATC) system takes over. Unfortunately, while we all depend on this system, severe management and under-investment prob lems have allowed the ATC system to become seriously outdated. But even with ob solete equipment, it is hard to imagine a manual replacement for it. Think of the stock exchanges where hundreds of millions of shares trade hands every day. In the 1 960s, the NYSE had to close one day a week to clear trades with a volume that is a fraction of today's. In October of 1 998, the NYSE traded 1 . 2 billion shares in a single day ! The New York-New Jersey area has been implementing electronic toll collec tion at bridges and tunnels; it is to be extended to all area toll roads as well. Even tually, the same system should be in place on much of the East Coast. We know
61
62
PART ONE: THE ROLE OF MANAGERS IN I N FORMATION TECHNOLOGY
the manual, non-IT option; it is in place today with human toll takers and collec tion booths that do little to speed traffic flow. Getting motorists through the toll plazas faster would reduce their travel times and increase the capacity and utiliza tion of the bridge, tunnel, or roadway. The new system, called EZ Pass, requires the motorist to attach a transponder to the windshield. When a car so equipped approaches a toll gate, a device at the gate reads the account number from the transponder, charges the toll, and gives the mo torist a green light to proceed. A driver may have an automatic account in which his or her credit card is charged when the toll balance reaches $10, or a manual ac count in which one sends a check. In the case of the latter account, a sign lights at the toll plaza when it is time to add funds. Drivers receive an itemized monthly statement showing the date, time, and facility for which they were charged toll. The manual system of toll takers has reached capacity; it is very difficult to add more toll booths in most locations. The only feasible way to expand capacity is through an investment in information technology. If the task for which you are investing has to be done and there is no other way but with information technology, then you probably have little choice in the mat ter. Some of the high-profile applications have produced substantial benefits for the companies who innovated with technology. There is considerable upside po tential if you are the first organization to develop this innovation. Certainly if you are the first mover, then there is a high probability of obtaining a return from in vestments here; a typical number might be a 75 percent probability of obtaining returns. A Direct Return. Applications of IT in this category are the textbook case. You can measure an expected return, evaluate the costs, and use a number of cap ital budgeting techniques to decide whether to invest. Direct applications are well-structured, and estimating costs and benefits is relatively easy compared to other categories in the matrix. There is a very high probability of obtaining a re turn from investments in systems from which you see a direct benefit from the start. However, because you have identified the returns to start with, the upside potential here is probably not too great unless you can build on the system with some innovation. An exception to these observations on the upside comes when there is the po tential to affect a large portion of an industry. We will see an example of electronic data interchange in the automobile industry; this technology has also had a major impact on grocery and clothing retailers. Health care is another field in which there is great opportunity for major cost savings with technology. Indirect Returns. This is a relatively new category that we have identified in some recent research on airline computerized reservations systems (CRS) in travel agencies. A simple example may help. Federal Express has a site on the Web where you can check on the location of packages. Before this service, the only way to check was to call a toll-free number and speak with an operator. Fed eral Express expects direct returns from this system through reductions in the use of its toll-free number and the ability to handle more inquiries with the same or smaller staff. Indirect benefits accrue from this technology if customers develop
CHAPTER 3: I N FORMATION TECHNOLOGY IN PERSPECTIVE
more loyalty to FedEx because it is easy to check on their package using the In ternet. In a discussion of this example, a student mentioned that she had been on hold for 30 minutes the last time she called, so the time the system saves the cus tomer is an added indirect benefit. This example shows how difficult it can be to measure indirect benefits. In the airline CRS case, it was years after the development of these systems before the airlines placed terminals in travel agencies. For FedEx, how do you measure in creased customer satisfaction and loyalty and relate it to revenues and profits? The potential upside is great from investments in this category, but very few applica tions result in significant indirect benefits. Given the difficulty of identifying indi rect returns, and even of thinking what they might be, you probably are looking at a 50 percent or lower probability of obtaining indirect benefits from an investment in technology. Competitive Necessity. While sometimes ideas for new technology innovations do not obtain an enthusiastic response from senior management, one argument that attracts notice is to say that "our competitors are developing a similar application," or worse, "our competitors have already implemented this system and are captur ing market share." One of the best examples of technology that is a competitive necessity is the bank automatic teller machine or ATM. Several researchers have studied ATMs to see if banks have reduced costs or increased revenues at the expense of competitors; one
Chase Manhattan Bank makes a concerted effort to attract customers outside of its core New York metropolitan and Texas lo cations, which it serves through more than 600 branches. It targets over 30 million cus tomers in almost every state for its banking services. The mechanism for this effort is technology, telephones, computers, and mail. Some 28 percent of net i ncome at Chase is from consumer banking. Chase is building a computer network and a database market i n g capa b i l ity to search customer data for sales possibili ties. The database contains information about Chase customers who use its credit cards and/or regional banks. Chase used its d atabases to s e n d out 3 0 0 m i l l i o n pieces o f mail and a s the basis for 1 40 mil lion sales calls last year. Chase has to face the fact that 60 percent of Americans say
they like to have branch banks available to them. Big banks like the merged Nations Banc and Bank of America are seeking the same customers through 4900 branches in the U.S. I n addition to its database, Chase de velops custom applications for groups of customers. It has 7000 auto dealers using a system that provides approvals for a customer's loan application in about three minutes. Chase has embraced the idea of a virtual bank; the question is whether consumers will b e eager to use its electro n i c services. Given the increasing number of people con nected to the Internet at work and home, it appears that the question is not if, but when, virtual banking will become the preferred way of handling financial decisions and transactions.
63
64
PART ONE: THE ROLE OF MANAGERS IN I N FORMATION TECHNOLOGY
conclusion is that ATMs are simply a competitive necessity. There is evidence of a slight advantage to the first banks that installed ATMs, but all of that advantage has disappeared with banks forming networks of ATMs to meet customer demand for widespread ease of access. It is hard to imagine a bank today that does not offer ATMs. At least at the time ATMs were first installed, there seemed to be few direct benefits. However, as technology matures, it is possible that an investment in this technology will have a payoff. As mentioned earlier in Chapter 1 , the chairman of NationsBank indicated that the bank had closed about 150 branches in 1 996 while installing between 600 and 1 000 new ATMs . If customers are ready to accept fewer branch locations, ATM technology, which first was a competitive necessity, may become a way to substantially reduce costs. What is the upside in investments in this category? Probably little if you are fol lowing others in the industry. Unless you can come up with an innovation, you are simply replicating your competitors. Any advantage you might gain from the sys tem has already been competed away; my estimate is that there is a 20 percent chance of obtaining a return from your investment in systems that are a competi tive necessity. Strategic Application. Beginning in the 1980s there was a great deal written about the strategic use of IT. American Hospital Supply, which merged with Bax ter International, only to be spun off again as Allegiance, provides a 30-year his tory of integrating technology with strategy. Since the publicity about Baxter and a few other companies, looking for strategic applications has become very popular. Several companies like Baxter, Merrill Lynch with its cash management account, and Brun Pas sot discussed in Chapter 1 , have all provided success stories. Unfor tunately, these stories have very little evidence; one has to make a lot of assump tions about the impact of the technology to be convinced that IT is responsible for the firms' successes. A few of the strategic applications only became strategic after someone recog nized that a rather ordinary system could be used for another purpose. For both Baxter and Brun Pas sot, technology made it easier for customers to place orders with the company. Each firm took advantage of this ability to provide better ser vice and get closer to customers by devising new strategies based on technology. It is unlikely that they recognized their order processing systems as strategic applica tions when they were first implemented. In cases where the strategic nature of a system becomes obvious only after it has been installed, it will be difficult to include strategic considerations in justifying the investment. Strategic advantage is often stated in terms of increased market share, something very hard to predict because of the response of both the market and com petitors. If you can identify a system as strategic in advance, my estimate is that you have a 50 percent chance of seeing the kind of returns in market share you hope to obtain from your investment. We discuss IT and strategy further in Chapter 5. Transformational IT. This type of investment is my favorite, and, of course, it is very difficult to implement. Here you use a combination of management and technology to change the basic structure of the organization. This kind of change,
CHAPTER 3: INFORMATION TECHNOLOGY IN PERSPECTIVE
as we shall see in Chapter 4, requires more than technology; management has to adopt a new philosophy as well. In the examples we shall see, the technology will not tum out to be all that sophisticated. However, management will use it in cre ative ways to define new organizational structures and modes of operation. Examples of companies in this category include "T-Form" organizations ; others have described virtual organizations and networked companies that fit in this cate gory. While the technology here is often simple, the entire change program is risky. I estimate a 50 percent chance of obtaining a return from investing in tech nology for the purpose of transforming the organization. This estimate is low be cause firms introduce many, many applications without obtaining the changes they expect. Often the failure to obtain organizational changes occurs because manage ment expects the technology to be enough to change behavior. If you are looking for a major change in the organization, then you might exert a significant manage ment effort to create a transformation. What Is Value? The most common meaning of value is monetary worth; in the marketplace buyers and sellers place a value on goods and services that is measured in dollars. When an investor seeks a return on capital, it is expressed as a percentage of the original investment. However, the term value sometimes has a very remote connection with money; for example, a manager describes an employee who makes a valuable contribution to the firm. It might be possible to trace this contribution to the com pany's profits, but that is not the intent of the comment.
65
66
PART ONE: THE ROLE OF MANAGERS IN I N FORMATION TECHNOLOGY
Some investments demonstrate traditional returns that can be expressed in mon etary terms. Other examples require an effort to estimate an indirect return from an IT investment. Sometimes, it appears that an IT investment has prevented a nega tive return, for example, when a firm develops a system to keep up with a competi tor and avoid losing market share. In instances where technology becomes inter twined with the strategy of the corporation, the contribution of IT seems very valuable, but exceedingly difficult to value. In justifying IT initiatives, you will have to be creative in predicting the value the organization will receive from its investments. It is important to realize that there is more to value than a measurable financial ROI and that different kinds of IT investments provide different types of value. THE CASE OF CHRYSLER Chrysler Corporation illustrates how technology has become a central component of a modem firm. It shows how IT was used to dramatically improve operations and efficiency, and contribute to saving a company that was near bankruptcy on two separate occasions. The dramatic success of Japanese auto manufacturers created a movement toward lean production and just-in-time (JIT) inventory. While these two concepts are often described as synonymous, JIT is only one part of lean production. Lean pro duction begins with a different concept of a factory than the typical mass-production manufacturing facility (Womack, Jones, and Roos, 1990). In a lean production facil ity, space is kept to a minimum to facilitate communications among workers. One sees very few indirect workers like quality control inspectors, people who add little value to the final product. You are likely to find only a few hours' worth of inventory at each production station (yes, this is the just-in-time inventory). If a worker finds a defective part, he or she might tag it and send the part to a quality control area to receive a replacement part. Each worker is probably able to pull a cord to stop the assembly line if there is a problem, yet the focus is on solv ing problems in advance. When developing new products, a lean firm is likely to use matrix management and design teams. The chief designer of the Honda Accord "borrowed" people from appropriate departments for the duration of the project. Key decisions are made early in the design, and the team is not afraid of conflict. Because manufac turing representatives are on the design team, an effort is made to see that the new product can be manufactured efficiently. A key aspect of lean production is coordinating the supply chain. A modem au tomobile contains some 1 0,000 parts, many of which come from outside suppliers. In a lean auto plant, over 70 percent of the components are likely to be purchased from external vendors. In the Japanese auto industry, the strategy is to establish long-term relationships with suppliers. The manufacturer will help the supplier improve production and quality; savings are split between the auto maker and the suppliers. What one gives up in terms of choosing from competing suppliers has to be made up by dependable and high-quality parts from the chosen suppliers.
CHAPTER
3:
INFORMATION TECHNOLOGY IN PERSPECTIVE
This description of lean production has concentrated on the production process itself. The most important component of lean production, however, continues to be management and its beliefs about how the firm should operate. The GM-Toyota experiment known as the NUMI plant in Fremont, California, shows clearly how management's beliefs and attitudes affect innovation. The idea of the joint venture was that GM would learn lean production techniques from Toyota, and Toyota was in overall charge of the plant with various GM managers as a part of the manage ment team. The plant, using rather limited automation, achieved better production results on a number of measures than plants GM was heavily automating at the time. In spite of the clear benefits of lean production, it was resisted throughout the rest of GM, contributing to the ongoing crisis at the world's largest automaker. An excellent example of lean production and just-in-time inventory comes from Chrysler which committed itself to lean production. It already was close to Toyota in the number of parts purchased externally-about 70 percent, compared to GM's 30 to 40 percent. Lean production at Chrysler meant working with some 1 600 ex ternal suppliers that ship materials to 14 car and truck assembly plants in North America. This example shows how information technology, especially communi cations, enabled Chrysler to achieve its production goals. Key to lean production and JIT inventory is electronic data interchange (EDI), in which electronic messages replace paper documents exchanged with suppliers. EDI is a common format for the electronic exchange of information between compa nies. In implementing lean production, Chrysler had some 17 million transactions per year with suppliers. These transactions included orders for parts, scheduling and rescheduling of deliveries, and payments upon receipt of the goods. The automaker began lean production in 1 984, and by 1 990, it reduced on-hand inventory from 5 days to 2 days, eliminating more than $ 1 billion from inventories. Information technology enabled JIT by providing high-speed electronic linking with suppliers and by making it possible to handle the huge volume of transactions in a short time. Chrysler also followed the model for lean production set by the Japanese. It stud ied components and options, and redesigned them to reduce complexity. Engineers worked with suppliers to be sure parts were packaged so that they would not be dam aged in transit; there was little buffer inventory to make up for a bad part. The market ing staff developed forecasts to stabilize schedules for the assembly line. A stable build schedule is important for suppliers so they know what goods to deliver and when to send them. Chrysler moved to in-sequence building to provide predictability for parts suppliers. A car begins the production process in a sequence and stays in that position until finished; you do not pull a car off the assembly line for special work. Pay-as-Built is a program Chrysler has begun with some suppliers to further re duce transactions costs. In this program, Chrysler counts the number of cars built each day and computes the number of a vendor's parts in that car. The computers then wire payment to the vendor for the materials used during the day. If Chrysler built 1 000 Jeeps with Firestone tires, it would pay Firestone for 5000 tires (four plus a spare) for that day. The vendor does not have to bill Chrysler, and Chrysler has many fewer transactions to process.
67
68
PART ONE: THE ROLE OF MANAGERS IN I N FORMATION TECHNOLOGY
Chrysler also took advantage of its JIT capabilities to reduce less-than-truckload (LTL) delivery costs by 1 5 percent. With a predictable schedule on what is to be built, Chrysler developed scheduled pickup loops. A carrier now follows the same route each day, picking up from multiple locations. As a result, the LTL shipments are "consolidated," and the truck is chartered to Chrysler. Much like a school bus route, the same driver makes the same stops each day. This program has allowed Chrysler to trim some in-plant inventories from 2 days to 4 to 6 hours. A study of Chrysler's efforts produced an estimate of a $60 per vehicle savings for the typical assembly plant attributed to electronic data interchange. (Mukhopadhyay, Kekre, and Kalathur, 1 995). These savings come from reduced inventory holding cost and reductions in obsolete inventory, premium freight, and transportation costs. In addition, the researchers estimate that EDI saved $39 per vehicle in information handling costs, for a total savings of $ 1 00 per vehicle. At current production levels, the savings total $220 million each year for Chrysler. The kind of production process described here could not function without infor mation technology. The production automation of manufacturing systems includes forecasting, building plans and materials requirements planning, and creating the kind of stable production and advance notice required for lean production and JIT to work. Because the flow of parts has very little room for error, communications to suppliers must be instantaneous. Electronic linking and communications and electronic customer/supplier relationships are key to making JIT work. These de sign variables also contribute to efficiency, for example, through the electronic linking of the pay-as-built program. What has happened to Chrysler's inventory? Where has $ 1 billion worth of goods gone? Chrysler now has a virtual inventory, and this inventory is no longer stockpiled at Chrysler plants. Instead, the inventory exists at suppliers and is linked to Chrysler through an electronic network. This network informs suppliers when goods are needed, and they in tum respond. But wait, what about the suppli ers? Do they really have Chrysler's inventory in their warehouses? If Chrysler pro vides a supplier with predictable demand, then the supplier can practice JIT with its suppliers all the way back through the value chain for a product. Greater con nectivity throughout the production system has driven out physical inventory and substituted the electronic flows of information. Certainly IT alone is not enough. The companies involved have to make many other changes in their operations. However, the technology described here is a crucial enabler of lean production and JIT inventory. How does Chrysler fit our framework of Table 3-2? The JIT and lean produc tion effort affected individuals, workgroups, the organization, and external orga nizations. Workers cannot count on having more than a few hours' worth of parts on hand; they depend on information systems to communicate with suppliers and on suppliers to deliver parts. The JIT effort involves managing and controlling the organization, decision making, interorganizational relations, reporting, and de signing products and business processes. Technology includes transactions pro cessing, databases, communications, networks database, and interorganizational systems.
CHAPTER
3:
I N FORMATION TECHNOLOGY IN PERSPECTIVE
CHAPTER SUMMARY 1. A framework helps to conceptualize a diverse field like information systems. 2. Simon as well as Gorry and Scott Morton provide insights into the different types of systems and decisions that one finds in an organization. The distinc tion between structured and unstructured decisions is important as we think about applying IT to problems in organizations. 3. An organization is a complex entity with many different components; the en vironment for applying technology is quite complex. As a result, we find a va riety of technologies in place in firms. The prototypes include transactions processing, decision support, and communications-oriented applications. 4. We shall use a framework in the text that stresses the organization and its components: individuals ' workgroups and links to external organizations. In dividuals face a number of managerial tasks, and it is possible to support these tasks and the organization through a rich variety of technologies. 5. Different kinds of IT investments provide differing types of value to the firm. It may not always be possible to show a measurable financial return on an IT investment, but the investment may have a great deal of value for the firm. 6. The Chrysler case illustrates how a variety of information technologies en abled management to implement a lean production system, a system that has probably saved Chrysler from disappearing as a U.S. auto manufacturer and made it an attractive merger partner for Mercedes Benz.
IMPLICATIONS FOR MANAGEMENT As a manager, you are interested in results. Why should you care about different kinds of technology? You will be using this technology to produce results, to solve problems, and to initiate new strategies. You may restructure the organization around IT. Unless you are fortunate to be starting a new enterprise, you will en counter a collection of hardware and software that has grown in the organization over time. Some of Chrysler'S systems were first developed in the 1 960s; they have been heavily modified, but they are still in use. You cannot afford to discard all old technology and replace it with new IT overnight, any more than Chrysler can rebuild its manufacturing plants every year. You will have to adapt and use a combination of old and new technologies to accomplish your objectives.
KEY WORDS Architecture Batch Client-server Command and control Database Edit Electronic data interchange (EDI)
69
70
PART ONE: THE ROLE OF MANAGERS I N I N FORMATION TECHNOLOGY
Electronic mail Framework Infrastructure Interactive IntemetlIntranet application Interorganizational system Just-in-time (JIT) Lean production Models Net present value On-line transactions processing (OLTP) Personal computer Value Virtual components RECOMMENDED READING Gurbaxani, V.; and S. Whang. "The Impact of Information Systems on Organizations and Markets." Communications of the ACM, 34, no. 1 (January 1991), pp. 59-73. (An inter esting article on the impact of IT on the marketplace.) Lucas, H. C., Jr. Information Technology: The Search for Value. New York: Oxford Uni versity Press, 1999. (A book that attempts to place IT investments in perspective.) Mukhopadhyay, T.; S. Kekre; and S. Ka1athur. "Business Value of Information Technol ogy: A Study of Electronic Data Interchange." MIS Quarterly, 19, no. 2 (June 1995), pp. 137-156. (An interesting study of the impact of ED! at Chrysler.) Stohr, E.; and B. Konsynski. Information Systems and Decision Processes. Los Alamitos, CA: IEEE Computer Society Press, 1992. (An excellent collection of papers on how in formation technology can support organizations and decisions.)
DISCUSSION QUESTIONS How can information technology contribute to unstructured decisions? Is there any role for batch processing given today's technology? 3. Why do you suppose inquiry-only applications were developed instead of fully on-line systems? 4. What are the advantages and disadvantages of providing access to a firm's transactions processing systems through the Internet? 5. Looking at Table 3-4, in what category does the Sabre reservations system fit best? Is there more than one category for this system? Please explain. 6. What are the major characteristics of the client-server model? 7. What advantages does client-server computing provide for users compared to main frame applications? 8. What are the drawbacks of mathematical models applied to management problems? 9 . What are interorganizational systems? 10. Why are standards important for the Internet? 11. What role does information technology have in managing a global business? 1.
2.
CHAPTER
3:
I N FORMATION TECHNOLOGY IN PERSPECTIVE
12. What
are the social issues involved in having massive files of personal data available on-line? 13. What are the major differences between transactions processing and decision-support systems? 14. How does the Internet present a possible model for the future of technology? 15. One critic has suggested that management information can never be automated. What is your reaction to this statement? 16. What are the special requirements for a system like the one that controls air traffic? 17. Inventory control is a key management task. How does technology affect inventories? What has the impact of better inventory control been on the economy? 18. An entire industry exists for selling information. Make a survey of some of the data for sale and classify them by functional area, such as marketing, finance, or economics. 19. How does electronic data interchange enable lean production at Chrysler? 20. How can an IT innovation have value but not show a monetary return on investment for a company?
CHAPTER 3 PROJECT
Information Systems Critiques There are information systems all around us. We encounter them at the university, in stores and banks, when making airline, hotel, or rental-car reservations, and in many other aspects of our daily routine. For this project, choose an information system and critique it. First, describe the system: What are its objectives? Who are the users? What is the underlying technology including computers, databases, and communications network? Trace the input of the system to determine who inputs what information. Look at the output of the system. Is it a physical document? Often, systems have to store data on a more or less permanent basis in files or in a database. Can you figure out what is in the database for your system? Draw a diagram of the input, processing, database, and outputs of your system. What are the major strengths of the system? Do you see any problems with it? What can you suggest to improve the system?
71
Management of information technology policy and strategy
72
PART TWO
I
In
I
I
this part we emphasize how technology is used to create flexibility in
the organization and how it provides new variables for managers to use in designing organizations. IT offers new ways to change the structure of an existing organization or design an entirely new nontraditional one. No longer is a physical location and time as important in constructing organi zations. Technology can substitute for physical proximity and contact in a
The design of information technology and the design of organizations have become the same task.
number of situations.
Top management has a key role to play in the management of informa tion processing activities in the organization. There is much emphasis today on using information technology as a part of corporate strategy, a topic that is addressed in depth in Chapter 5 . We also see how difficult it is to sustain a competitive advantage when you have achieved it. Once you decide to be competitive with technology, you must continue to invest and develop new systems and services. In this part, we also discuss information systems policy. What are the key areas for the involvement of top management? What policy should top man agement establish for the information systems effort in the organization? A
73
74
PART TWO: ORGANIZATIONAL ISSUES
successful information services function begins with strong and effective leadership at the top levels of the organization. The last chapter in this section examines IT and international business. Firms are developing their international markets in order to grow and pros per; they are adopting a global strategy. What is the impact of IT on inter national business? What special problems do global operations create for managing information technology?
CHAPTER 4
,
I
I n III
I
Outline Modern Organizations
Organizational Structure and Design What Is Organizational Flexibility? Impact on Flexibility Information Technology Runs the Airline Co-opting the Travel Agent Technology Transforms the Securities Industry Natural Growth Generates an Impact Conclusions Creating New Types of Organizations
Examples of Designs Using IT Variables Adding People to the Design Building a T-Form Organization
People in the T-Form Other Design Possibilities Adopting the T-Form: An Example
Focus on Change In this chapter we see how technology can be used to dramatically restructure or ganizations, permanently changing the way they do business. In particular, note how technology has contributed to flexibility when looking at the organization as a whole, even though users may consider individual applications to be inflexible. The 75
76
PART TWO: ORGANIZATIONAL ISSUES
information technology variables discussed in this chapter have the greatest poten tial for transforming the organization because they provide a way to significantly change the structure of an existing organization or design an entirely new nontradi tional one. Over the next few years, the ability to use technology to create novel or ganizational structures may tum out to be IT's most significant contribution yet. •
Information systems exist in the context of an organization; they do not operate in isolation. There are a number of definitions of organizations. For our purposes, an organization is a rational coordination of activities of a group of people for the purpose of achieving some goal. The activities of the group of people are coordi nated; that is, there is a joint effort. In most organizations some division of labor and a management layer provide for the rational coordination of activities. The definition also contains the goals of the organization; there are many different types of organizations with different kinds of goals. The formal organization is what appears on the organization chart, usually with well-defined reporting relationships among managers and workers that describe its structure. Social organizations, on the other hand, are patterns of coordination that arise spontaneously from the interaction of a group. Social organizations have no rational coordinated structure and generally lack explicit goals. The informal organization is the pattern of relations and coordination among members of the formal organization that is not specified on a formal chart. It rep resents the social interaction and is a more realistic portrayal of the formal organi zation because it reflects how people actually interact. For example, a group of workers may form an informal task force using electronic mail or conferencing systems on a computer network; this task force cuts across traditional organiza tional boundaries and constitutes a temporary, informal organization. We must be careful to avoid designing information systems that follow unreal istic standards and procedures. We may find that these prescribed rules are not ac tually followed and that our system is unworkable because we have adhered too closely to formal organizational considerations. It is hard to observe and describe the informal organization as it depends on the personalities of specific individuals and patterns of behavior that have developed over time. MODERN ORGANIZATIONS Unfortunately, we cannot point to one unified picture that has emerged from vari ous approaches to the study of organizations. We still are confronted with many different ideas about organizations and the way they operate. Organizational Structure and Design There are many factors that influence the structure and design of modem organiza tions. New information technology also offers opportunities to create exciting new forms of organizations.
CHAPTER 4: THE I MPACT OF INFORMATION TECHNOLOGY ON THE ORGANIZATION
Uncertainty One of the major factors influencing organizations is uncertainty. Many authors suggest that managers try to eliminate or reduce uncertainty. An or ganization and its managers confront many different types of uncertainty. There are frequently technical uncertainties about whether a new product can be manu factured or whether it will work. Market uncertainties exist when the firm does not know how a product will be received, potential demand, response from competi tors, and so on. The internal management of an organization also creates uncer tainty. Key personnel may leave or individuals may not adequately perform their assigned tasks. Thus, the organization and its managers face many different types and degrees of uncertainty. The importance of uncertainty is seen by examining organizations that face differing environments. Consider a chip manufacturer like Intel confronted with the dynamic environment of technological change versus the staid, conser vative atmosphere of a regulated utility facing virtually no uncertainty. There is some evidence that uncertainty is most effectively handled by decentralizing decision making to a management level in the organization with information to resolve it. Specialization Another major consideration in organizational design is special ization. Are specialized skills or conditions required for some tasks? Consider the activity of running a complicated machine tool versus sweeping the building; cer tainly, the former requires a specialist. From our standpoint, the information ser vices department is highly specialized and requires a level of technological profi ciency on the part of its staff. Coordination When there is specialization, one task of management is to coor dinate the diverse specialties to achieve the goals of the organization. Management must balance differing orientations and resolve disputes between specialized sub units. For example, the marketing department may want to produce a particular item in each style and color for every warehouse. This plan is best for reducing un certainty and providing good customer service. On the other hand, manufacturing may want to make products of the same color and model because this procedure reduces the uncertainties in production; that is, there are fewer setups and smoother production runs. Management must resolve these differences and coordinate the specialists. There are a number of integrating mechanisms to reduce the effects of differentia tion or specialization. Sometimes organizations create special liaison positions or even departments to foster coordination. A major advertising agency has a group of expediters who see that the details of purchasing advertising time and space are organized and that the ads appear in the right place at the right time. We shall see later how information technology can also be used to help managers coordinate groups in the organization.
77
78
PART TWO: ORGANIZATIONAL ISSUES
Interdependence The last factor we shall consider in organizational structure is interdependence; that is, how do the different departments or subunits within the organization depend on each other? Thompson ( 1 967) has described three types of mutual dependence. Pooled interdependence occurs when two organizations depend on each other because they are all components of a larger organization; one unit does not de pend directly on another. For example, the different divisions of a conglomerate exhibit pooled interdependence. Sequential interdependence occurs when the output of one unit is the input to another. For example, the painting and finishing department depends on outputs from component assembly. We can view each succeeding station on an assem bly line as an example of sequential interdependence. Reciprocal interdependence occurs when the output of each unit becomes the input for the other. For example, a student depends on the professor to explain concepts in class so that she can do her assignment and the professor depends on students to prepare for class. Interdependence is an important consideration in organizational design. The type of interdependence affects the amount of power one unit has in the organiza tion. In designing an organization or modifying the design (for example, through the development of a new information system), various interdependencies must be coordinated. The easiest type of interdependence to handle is pooled, the next hardest is sequential, and the most difficult is reciprocal. What Is Organizational Flexibility?
Flexibility is the ability to adapt when confronted with new circumstances. A flexible organization defends quickly against threats and moves rapidly to take advantage of opportunities. Flexibility provides the organization with the ability to adapt to change and respond quickly to market forces and uncertainty in its environment. Technology changes the pace of work. It has speeded up order routing and pro cessing on the stock exchange. Technology has made it much faster to search a li brary book catalog, to communicate with someone at a remote location, and to perform a number of tasks. Technology can also be used to shorten product devel opment cycles. In general, technology speeds up the pace of work and increases the capacity of the organization to process information. Information technology also alters the space and time boundaries of work. Using electronic mail and computer conferencing, colleagues working on a project do not have to be in the same physical location. Even people who work together in the same office can communicate easily if traveling. With a portable computer and modem, you can conduct some kinds of business from virtually any location at any time of the day or night. Thus, we see that technology has the ability to change the pace of work and to alter time and space boundaries for work. These impacts of technology can be viewed as increasing organizational flexibility. With properly designed systems,
CHAPTER 4: THE IMPACT OF INFORMATION TECHNOLOGY ON THE ORGANIZATION
79
TABLE 4·1 ORGANIZATIONAL FLEXIBILITY I N THE AIRLINE AND SECURITIES INDUSTRIES
Nature and pace of work
Time
Boundaries
Responsiveness
Airline CRS stage 1 *
Make reservation anytime
Remove boundary of manual centralized processing; make reservation from anywhere
Confirmed reservation made instantaneously
Alter schedules in response to loads
Airline CRS stage 2
Boundary for making reservation shifts from airline to agent; airport boarding pass moved to travel agency
Extra service by agent, e.g., 24-hour assistance
Travel agent becomes more productive
Yield management programs allow instantaneous adjustment to demand for seats
Securities firm back office
Make data available to brokers on-line
Eliminate need to close exchanges early
Greatly speed processing of trades
Create new products and services
Securities industry trading at exchanges and member firms
Able to route orders without intervention of floor broker; floor becomes an extension of brokerage office; may remove need for floor, e.g., NASDAQ, London Stock Exchange
Movement toward 24-hour trading; passing the book around the world for currency; New York City to London to Tokyo; trade anytime
Able to execute trading decisions instantaneously
Enable new investment strategies
'Computerized reservation system (CRS).
the organization can increase its ability to respond to customers, competitors, and the environment in general. Impact on Flexibility Table 4-1 describes the history and impact of technology in the airline and securi ties industries. Information Technology Runs the Airline In the early days of airline travel, few people ventured forth on the relatively small propeller aircraft. If you wanted to make a reservation, everything was done manu ally, and there was no actual record associating your name with your flight. The airline allocated a number of seats to the departure city and to a few other cities. When the number of available seats began to dwindle, a reservations office would
80
PART TWO: ORGANIZATIONAL ISSUES
have to call a central location to be sure it could sell a seat. One never knew for sure if he or she had a reservation because a name was never associated with a reservations record. In the late 1 950s, American Airlines realized that its manual reservation process could not keep up with the expected growth in travel. At this time almost all civil ian information systems ran in batch mode; that is, all data were collected at once, key punched, and used to update computer files at a later point in time. Such an approach would not work for an airline reservation system because people throughout the country need to be able to update and inquire against files instantly. Fortunately, IBM had at this time completed a defense system called SAGE, which allowed operators to interact with real-time data from radar. The operator could display different information proces sed by computers from a console. IBM and American Airlines established a joint project to develop an automated airline reservation system that would be on-line. IBM would develop the control programs that managed on-line processing, while American would write the appli cations program that provided the logic for making airline reservations. Surpris ingly, the system was completed shortly ahead of schedule, though with a large cost overrun, and provided a basis for the development of others like it by compet ing airlines. The computerized airline reservation systems maintain a large database that contains the names of passengers associated with their flights. In the early days these systems were known as passenger name reservation (PNR) systems because the idea of keeping a name with a flight was so novel. The difference in service is incredible when the computerized reservation systems (CRSs) are compared with their predecessor manual system. What was the initial impact of the airline reservation systems? They removed the limitation of a manual, centralized reservations group. In terms of time and space, you could make a reservation anytime of the day or night from virtually anyplace in the world. The features of these systems contributed to their secondary impact: a competi tive advantage based on customer service. Airlines with reservation systems could provide better service to their customers. They could also better manage the airline because they had historical data on reservations and boardings. Using their reser vation system as a base, airlines have added many functions ranging from meeting special dietary requests to balancing the loading of the aircraft. A third effect is that one would have great difficulty starting up an airline with out a reservation system. Donald Burr, chairman of People Express, pointed out the lack of a decent reservation system as one of the factors that contributed to the demise of his airline. People Express had too few reservation lines; it was not un usual for customers to be unable to reach them from early morning until late evening because of the large number of callers. In addition, in recent years the airlines developed yield management systems; these programs look at future flights and dynamically adjust the number of special fare seats depending on the number of reservations so far. Burr felt that the airlines
CHAPTER 4: THE IMPACT OF INFORMATION TECHNOLOGY ON THE ORGANIZATION
could use their systems t o target People's flights, and competitors could selectively lower their fares on competing routes and still keep up their margins on other routes. Co-opting the Travel Agent For several years the airline industry waited for an agreement on a common reser vation system to be placed in travel agents' offices. Finally, United and American decided not to wait any longer and began placing terminals connected to their sys tems in travel agencies. This move proved to be a tremendous benefit for both the agent and the airline. One first-order impact was a dramatic increase in the productivity of the travel agent. One of the most tedious and time-consuming tasks in an agency is writing tickets; the agency CRS came with ticket printers. Once the agent made a reserva tion, he or she could have the ticket printed automatically. Immediately each em ployee of the agency could write more tickets in a day. Another major first-order impact is the change in organizational structure and boundaries for reservations. The travel agent has become an extension of the air line's own reservations operation. Enhancements to the systems allowed agents to issue boarding passes with tickets. Thus, part of the boarding process has moved from the airport to the travel agency. Information technology takes care of the first part of boarding the plane well before the day of the flight. Today many air lines offer electronic tickets; you do not receive a physical ticket and the airline does not have to process your ticket ! IBM estimates that it costs $8 to print a physical ticket and less than $ 1 to create an electronic ticket. What will the im pact of E-tickets be on travel agents? Each airline tried various approaches to using a CRS to increase its own bookings. First, the host carrier (the airline whose system is used by the agent) would list his or her flights first. That is, on American's SABRE system, American's flights between two cities always appeared first. Because over 90 percent of flights are booked from the first reservation screen, the host airline enjoyed a tremendous advantage. Delta and other airlines complained about this inherent bias in computerized reservation systems. The Department of Transportation investigated and issued a series of rules requiring listings that did not unduly favor the host carrier. The car riers made the changes, grudgingly. By this time, American and United had spent well over $250 million each on their systems and they felt they deserved the re wards from that investment. A second-order impact of the system is a revenue-generating feature. In addi tion to the "halo" effect of more bookings from CRS-equipped agencies, the air lines with agency installations gained revenue. When an agent using American books a ticket on Northwest, Northwest must pay American a booking fee of about $2.50 to $3.00 per leg. There is one story of a travel agent in Minneapolis who booked most flights on Northwest, but used the United Apollo system and in one year generated $ 1 ,000,000 in fees for United. Recent suggested prices place the market value of SABRE at $3 billion. A third-order impact is the high value of this CRS resource.
81
82
PART TWO: ORGAN IZATIONAL ISSUES
The airline CRSs provide flexibility for the airlines, travel agents, and travelers. Technology has affected the booking of flights and managing of passengers from reservation to flight completion. Service is speeded up and is more convenient. The boundaries in time and space in making a reservation have changed as has the entire process of booking a flight and boarding a plane. Not only is the airline CRS an example of flexibility, it also illustrates the first-, second-, and third-order impacts of information technology. Technology Transforms the Securities Industry
Historically, stock exchanges have seen constant increases in volume. From an in formation processing standpoint, of course, the value of a transaction does not af fect back-office functions. If one share or a million shares change hands, the same processing is required. In the 1 960s the New York Stock Exchange was closing early because it could not keep up with the paperwork for processing and clearing trades. Yet the volume then was a fraction of today's volume; in October of 1998, the Stock Exchange had its first day in which trading exceeded one billion shares. As shown in Table 4-1 , the securities industry invested in extensive automation of back-office functions, first for handling trades and then to provide information for stockbrokers and traders. Data became available on-line to account representa tives, showing them their clients' position so that they could provide better service. These systems eliminated a bottleneck of time in processing by speeding up the flow of transactions. The New York Stock Exchange developed systems to facili tate routing orders faster to the floor without requiring a floor trader. Brokerage firms also streamlined their communications with floor brokers so orders got to the broker quickly. A second-order impact of this technology is its ability to make possible new trading strategies; for example, program trading is greatly facilitated by rapid order execution. Program trading involves buying or selling a basket of stocks that mirrors a stock index like the S&P 500. At the same time, the program trader must buy or sell the corresponding futures index on the Chicago exchange. The trader sells the more expensive of the two and uses the proceeds to buy the less expensive. This kind of arbitrage has generated a great deal of trading volume and controversy. First, program trades are created through computer programs that contain the logic used by the program trader. These programs search for an imbalance in the price of the stock index future and the underlying basket of stocks that make up the index; the programs then notify the trader who can then generate the appropri ate buy and sell orders. The orders are probably created by the computer and sent to automated exchange systems for execution. Because the price difference exists for only a short period of time, it is important for the buy and sell executions to be as fast as possible. If an order is too large for an automated exchange system, the trader can generate a large number of trading documents for floor brokers using the computer again. Various studies of program trading do not blame it for in creased market volatility or reduced liquidity. In terms of third-order impact of the technology, it seems logical there is an effect on volatility and liquidity as technol ogy facilitates large-sized holdings and trades.
CHAPTER 4: THE IMPACT OF INFORMATION TECHNOLOGY ON THE ORGANIZATION
When the stock market crashed in October 1987, one mutual fund sold more than $ 1 billion worth of securities. Without information technology, could that firm have managed a multibillion-dollar portfolio? Without technology, could it have generated enough sell orders to liquidate a billion dollars' worth of securi ties? That day other firms liquidated securities worth hundreds of millions of dol lars. The combined impact and demand for liquidity sent prices downward, possi bly reinforced by another tool called portfolio insurance. It is possible that program trades and portfolio insurance interacted early during the crash to put pressure on prices. (Later, however, price information was running so far behind that program trading does not seem to have been possible.) Natural Growth Generates an Impact
Technology dramatically affected the securities business. At first, the use of tech nology was for routine transactions processing. Soon the brokers realized the value of the back-office information since it enabled them to know their cus tomers' positions. Traders also adopted technology to facilitate new trading strate gies. The confluence of all of these trends has led to a highly automated industry critically dependent on information technology. Several exchanges are entirely automated or moving in that direction. The "Big Bang" in London, which eliminated fixed brokerage rates and encouraged off floor trading, has emptied the floor of the exchange. The NASDAQ computer sys tem for over-the-counter stocks in the U.S. has no actual exchange floor; technol ogy has eliminated the need for a physical place to meet to buy or sell stock. By 1995 there were days in which the volume of stocks traded on the NASDAQ ex ceeded the volume on the New York Stock Exchange. By 1 999, all the major exchanges were looking at replacing or supplementing their trading floors with electronic exchanges. Today several exchanges offer after hours trading-even 24-hour trading may become routine. After-hours trading will take place only through computers and communications networks. Within a few years, it should be possible to trade securities from virtually anyplace in the world, anytime of the day or night. (Currently you can enter trades at several brokerage firms like Charles Schwab and E-TRADE at any time, but they are executed only when the market is open.) Technology will completely remove time and space re quirements for trading. Conclusions
These examples show how information technology affects organizational flexibil ity in two major industries. It undoubtedly contributes to flexibility in other firms and industries as well. Technology has the ability to change the nature of work, primarily by speeding it up, and to alter the time and place of work. In some in stances, flexibility has surprises and unanticipated consequences. The government has placed certain requirements on the securities markets and on the ways in which airlines can use their computerized reservation systems. Certainly we want to encourage flexibility, but we must also anticipate the impact of technology on our firms and industries.
83
84
PART TWO: ORGANIZATIONAL ISSUES
CREATING NEW TYPES OF ORGANIZATIONS
Technology makes it possible to create new forms of organizations through the use of different design variables. A variable is something that takes on different values. For example, one calculates the interest payment (P) on a simple loan by taking the interest rate (0 times the loan's outstanding balance (B) or P i B. In this equation, P, i, and B are all variables; they can take on different values. The inter est rate might vary for different customers or types of loans. Obviously the out standing balance will differ among loans. For organizations, we have design variables like the span of control, a number that can take on different values. An organization that has chosen a span of control of 7 subordinates for each manager will be hierarchical while one that chooses a span of 20 will be much flatter. Table 4-2 shows examples of key organization design variables that you can use to build organizations. This table contains two types of variables: those labeled conventional and those that come from information technology. Information tech nology is defined to include computers, communications, video conferencing, arti ficial intelligence, virtual reality, fax, cellular and wireless phones and pagers, etc. The problem with conventional organization design literature is its failure to recognize the new design variables enabled by information technology. In the case of linking mechanisms, IT such as e-mail or groupware can be used instead of conventional solutions such as task forces or liaison agents. The new IT-enabled variables may be totally distinct from traditional design variables as we shall see when we examine "virtual corporations." IT-enabled variables may also be an ex tension of traditional variables, as in the case of linking mechanisms. In Table 4-2, conventional design variables drawn from the literature on organi zation design are contrasted with new kinds of IT design variables. The first col umn of the table groups conventional design variables into four categories: struc tural, work process, communications, and interorganizational. The third column presents new organizational design variables made possible through information technology. These electronic variables are: =
Structural Virtual components: The organization can use IT to create components that do not exist in conventional form. For example, some manufacturers want parts suppliers to "substitute" for their inventory. The supplier is linked through elec tronic data interchange with the manufacturer. Using overnight delivery, the supplier provides parts to the manufacturer just as they are needed for produc tion. The manufacturer now has a virtual raw materials inventory owned by the supplier until it arrives for production. Electronic linking: Through electronic mail, electronic or video conferencing, and fax, it is possible to form links within and across all organizational bound aries. New workgroups form quickly and easily. Electronic linking also facili tates monitoring and coordination, especially from remote locations.
CHAPTER 4: THE I MPACT OF I N FORMATION TECHNOLOGY ON THE ORGANIZATION
TABLE 4-2 CONVENTIONAL AND IT DESIGN VARIABLES
Class of variable
Conventional design variables
IT design variables
Structural
Definition of organizational subunits
Virtual components
Determining purpose, output of subunits
Linking mechanisms
Reporting mechanisms Linking mechanisms
Electronic linking
Control mechanisms
Work process
Staffing
Technological leveling
Tasks
Production automation
Workflows
Electronic workflows
Dependencies Output of process
Communications
Interorganizational relations
Buffers
Virtual components
Formal channels
Electronic communications
Informal communications/collaboration
Technological matrixing
Make versus buy decision
Electronic customer/ supplier relationships
Exchange of materials
Electronic customer/ supplier relationships
Communications mechanisms
Electronic linking
From Lucas and Baroudi, 1 994.
Technological leveling: IT can substitute for layers of management and for a number of management tasks. In some bureaucratic organizations, layers of management exist to look at, edit, and approve messages that flow from the layer below them to the level above. Electronic communications can eliminate some of these layers. In addition, a manager's span of control can be increased since electronic communications can be more efficient than phone or personal contact for certain kinds of tasks, particularly those dealing with administrative matters. Technology makes it possible to increase the span of control and possi bly eliminate layers in the organization, leveling it in the process.
Work Process Production automation: The use of technology to automate manufacturing processes is well documented in magazines and newspapers. IT is also used ex tensively for automating information processing and assembly line tasks in the
85
86
PART TWO: ORGANIZATIONAL ISSUES
financial industry. In cases where the product of a firm is information, IT is the factory. For white collar workers, intelligent electronic agents that roam net works provide one type of automation. Electronic workflows: Interest in process reengineering has led to the develop ment of workflow languages and systems. As organizations eliminate paper and perform most of their processing using electronic forms and images, workflow languages will be used to route documents electronically to individuals and workgroups that need access to them. Agents that can traverse networks to find information and carry messages will facilitate electronic workflows. Electronic workflows also contribute to the monitoring and coordination of work. Communications Electronic communications: Electronic mail, electronic bulletin boards, and fax all offer alternatives to formal channels of communications. Technological matrixing: Through the use of e-mail, video and electronic con ferencing, and fax, matrix organizations can be created at will. For example, a company could form a temporary task force from marketing, sales, and produc tion using e-mail and groupware to prepare for a trade show; participants would report electronically to their departmental supervisors and to the team leader for the show, creating a matrix organization based on technology.
Interorganizational Relations Electronic customer/supplier relationships: Companies and industries are rapidly adopting electronic data interchange (EDI) , Internet, and Intranet tech nologies to speed the ordering process and improve accuracy. These technolo gies help the organization monitor and coordinate relationships with other or ganizations, for example, firms acting as virtual components.
It is interesting to note that there is no specific IT variable next to the traditional variable "control mechanisms." Firms have used information systems to provide control after the organization has been designed. Examples include budgets, proj ect management applications, and similar monitoring systems. For example, Mrs. Fields Cookies uses a variety of traditional and IT variables in creating an organi zation with extensive controls. However, even in this case, there is no one IT con trol variable in the design. Examples of Designs Using IT Variables
The variables in Table 4-2 can be used to create the T-Form (technology form) or ganization. In addition to the T-Form, it is possible to characterize four new orga nization structures that make use of the IT design variables. These prototypes show a mixture of conventional and IT design variables and suggest some of the rich organization forms that will appear in the future. Table 4-3 shows each organization and how the IT design variables contribute to its development. In some cases the IT variable has a substitution effect for traditional
CHAPTER 4: THE I MPACT OF INFORMATION TECHNOLOGY ON THE ORGAN IZATION
87
TABLE 4·3 IT DESIGN VARIABLES AND FOUR PROTOTYPICAL ORGANIZATIONS
Organization variable
Virtual
Negotiated organizations
Traditional
Vertically integrated conglomerates
Virtual components
Substitute electronic for physical components
Substitute electronic for physical components
Use to replace isolated components
Force component onto electronic subsidiary
Electronic linking and communications
Essential part
Essential part
Optional
Essential part
Technological matrixing
Participate in matrixed group
Use for coordination
Use for various groups
Use for coordination and task forces
Technological leveling
Use to supervise remote workers and groups
NA
Use to reduce layers of management
Use to reduce layers of management
Electronic workflows
Crucial part of strategy
Crucial part of strategy
Use where applicable to restructure work
Key to coordinate work units
Production automation
NA
Communicate designs
Use where applicable
Coordinate production among work units
Electronic customer! supplier links
Used extensively
Used extensively
Potentially important
Key to operations
From Lucas and Baroudi, 1 994.
elements; in other cases it is necessary for the very existence of an organization form. In certain instances, the IT variable is optional or not applicable. Conventional organizations have historically grouped workers together to es tablish communications and coordination. In contrast to physical presence, IT design variables allow for virtual organization structures. The virtual organiza tion started 1 5 to 20 years ago as people began to see the possibilities of using technology for work at home. With electronic communications a physical orga nization is not needed for many kinds of tasks. For example, many catalog oper ations use individuals working from their homes using a phone connected to an 800 number. The virtual organization creates new management and coordination challenges. The kind of virtual office described above may be necessary to assuage a man ager's misgivings about supervision. Perhaps all members of this nonorganization will log in to virtual offices each morning to report in and have an electronic dis cussion with a supervisor. Microsoft offers Netmeeting on its network which makes it possible to coordinate work on PCs in different locations. CU-SeeMe is a program developed at Cornell. It is free and lets users on the Internet set up small videoconferences using inexpensive cameras.
88
PART TWO: ORGANIZATIONAL ISSUES
At first, only technology companies like IBM and AT&T eliminated employee offices. AT&T found that eliminating commute time with a home office allowed the sales force to spend 1 5 to 20 percent more time with customers. Now, other firms like Chiat-Day, an advertising firm, have eliminated physical offices for a large number of employees. When Compaq Computer Corporation moved its sales force into home offices, sales and administrative expenses went from 22 percent to 1 2 percent of revenue partially due to this change. Perkin-Elmer, a scientific equipment manufacturer in Connecticut, based 300 sales and customer-service representatives in their homes, which allowed it to close 35 branch offices. A second kind of IT-enabled organization is labeled "negotiated agreement." A flower company in California, Calyx and Corolla, is based on two negotiated agreements. (See Figures 4-1 and 4-2.) The first agreement is with Federal Ex press to deliver flowers overnight to any destination in the US at a favorable rate. The second agreement is with flower growers. Instead of selling exclusively to wholesalers, the growers agree to put together a number of standard arrangements. The final part of the organization is an 800 number staffed by clerks who take or ders. The orders are sent via phone or fax to growers who prepare and address arrangements for pickup and delivery by Federal Express. Through these negotiated agreements and communications technology, this company feels it can compete with the neighborhood florist and FTD. Calyx and
CHAPTER 4: THE I MPACT OF I N FORMATION TECHNOLOGY ON THE ORGANIZATION
FIGURE 4·1 A virtual negotiated-agreement organization.
FIGURE 4·2
The Calyx and Corolla web site.
89
90
PART TWO: ORGANIZATIONAL ISSUES
Corolla is a negotiated organization in that its existence and profitability depend on the agreements it has with others and the service supplied to its customers by others. Calyx and Corolla is, in effect, a broker using IT to coordinate its negoti ated production facility and its negotiated delivery system. The management challenge for the negotiated organization is to maintain ser vice and quality. The firm depends on its partners to provide a product or service and yet has limited direct supervision of the business. Meeting service targets and deadlines and assuring adequate quality control can be difficult. As an example, the floral firm might place random orders with its growers to have flowers sent to its own management to test delivery time and product quality. Just as department stores have used "shoppers" to test their own personnel and service, and to check on competition, the negotiated organization will need "electronic shoppers." Un like the purchase of some off-the-shelf product, an alliance that creates virtual components results in ongoing interdependence between the two partners. The two types of organizations described above are quite different from conven tional corporations. Traditional organizations are also using technology to make some changes in structure without making major modifications to the entire organization. An electronics manufacturer has set up a just-in-time electronic data interchange (EDI) link with a parts supplier, changing one component of the organization; the supplier can now be viewed as part of the manufacturer's raw material inventory. The traditional organization may call its redesign efforts "reengineering." Mer rill Lynch, for example, completely redesigned the way it processes physical secu rities turned over by customers. This effort resulted in the closing of two process ing centers and the creation of a new processing site. The firm adopted image processing to dramatically reduce the need to physically handle securities. In this process redesign, the total number of individuals employed in handling securities has been cut by 50 percent. Finally, with the process running smoothly, Merrill Lynch outsourced its operations and systems to a third party. There are many examples of the use of IT design variables to make changes in parts of traditional organizations. A management challenge in the traditional or ganization is to transform the organization enough so it can take advantage of the cost savings and competitive opportunities made possible by technology. The ob jective of process reengineering is to make dramatic improvements in how an or ganization functions. Today's business environment is characterized by rapid changes, and the traditional organization needs to take advantage of technological leveling to reduce layers of management, technological matrixing to improve co ordination, and electronic workflows to reduce paper handling. The traditional organization today is at risk unless it progresses toward the vir tual model and the T-Form to improve responsiveness. IBM, one of the largest and most admired "blue chips" in the 1 960s and 1 970s, struggled for a number of years with declining market share and bureaucracies that resisted the kind of sweeping changes necessary to be competitive. IT organization design variables help restructure traditional organizations by making them more flexible. However, bringing about the kinds of changes that are possible given the technology is a for midable management task not well suited to the traditional organization.
CHAPTER 4: THE IMPACT OF INFORMATION TECHNOLOGY ON THE ORGANIZATION
We labeled the last IT-enabled organization prototype a "verticailly integrated conglomerate," a form viewed with mixed emotions. The movement toward greater electronic exchange of data between customers and suppliers creates verti cally integrated conglomerates. This form will more likely emerge if there is a large power imbalance between the customer and the supplier. As an example, General Motors requires all its suppliers to use electronic data in terchange. For some suppliers, GM is such a large proportion of their business that the supplier becomes a component of GM, responding to its orders and demands. GM sends orders to the supplier's production-scheduling system and is permitted to modify production schedules, priorities, etc. As a result, GM obtains a substantial amount of control and can sever the relationship at any time for little or no invest ment. Vertically integrated conglomerates may not be desirable for all organizations. It should be made clear that managers must be careful when establishing elec tronic links. The efficiency is very appealing, but the link may lock a firm into a relationship that reduces its independence. Until the links are standardized-for ex ample, using an industry standard or an X.12 EDI protocol-firms involved have more flexibility in switching business relationships. If a link goes beyond simple exchange transactions and actually gives a customer access to one's production planning systems, then the supplier risks becoming a part of a verticaHy integrated conglomerate, for better or for worse. Adding People to the Design
One reaction to the discussion so far may be that it is a bit sterile-that is, where are the people? When do we consider how individuals relate to one another, how they are rewarded, and what is the nature of the tasks they perform? Where are
A Telluride, Colorado, a ski resort high in the Rocky Mountains, has become a haven for hardy telecommuters. Community leaders decided that this remote town needed con nections to the I nternet (see Chapter 1 2) and with help from the nonprofit Telluride In stitute, it has been able to provide I nternet accounts for fully one-third of its 1 500 resi dents. A few years ago, the town only had analog, party line phones! Town officials convinced U.S. West to replace these lines with private digital lines and to run a fiber optic trunk line to the town. The closest In ternet connection was in Denver, which meant high phone bills to use the Net. With
grants from the state, the town was able to buy two computers and create an Internet server for the town and a town b u l letin board . These two servers are available through a local telephone call. Apple Com puter heard about the town's projects and donated eight Macintosh computers to put in public buildings, creating an overnight sen sation as residents took to "cruising the Net." The town is also providing high-speed wireless communications, though this ser vice is much more expensive for users. Many vacation-only residents now live full time in Telluride and use electronic commu nications in place of physical presence.
91
92
PART TWO: ORGANIZATIONAL ISSUES
I n late 1 997, Mercedes Benz began selling an aggressively priced sport-utility vehicle made in Alabama. The M-Class Mercedes costs a few thousand dollars more than a Jeep Grand Cherokee or Ford Explorer; it has al ready won praise from reviewers. The plant has gone one step beyond just in-time (J IT) manufacturing, where suppli ers build components like seats weeks in advance and deliver them a few days or hours ahead of production. Mercedes is trying just-in-sequence manufacturing. As a vehicle goes through the paint shop, a computer sends an order to a sup plier, like Johnson Controls in Wisconsi n , t o deliver a dashboard within a few hours.
The plant assembles cars in which other suppliers manufacture 70 percent of the c o m p o n e n t s . The o bjective of j u st- i n sequence manufacturing i s t o dramatically reduce inventory management costs. The company contracted with I BM to develop t h e syste m f o r its 2 m i l l i o n - s q u are foot plant; IBM has installed enterprise re source planning software from The Baan Company. In this example, information technology provides electronic linking and communica tions and ties Mercedes to its suppliers . The objective i s t o reduce inventory man agement effort and costs while maintaining scheduled production.
organization politics? For the most part, politics and emotions in organizations are not of concern in IT-enabled organizations; they are no different here than in conventional organizations ! Politics and the beliefs of senior managers are likely to determine the direction of the firm, its strategy, and how resources are allo cated. The design remains neutral as its focus is on creating an efficient and com petitive organization. While politics and emotion are not unique to IT-enabled firms, people and tasks are an important component of any organization. The framework in the last chap ter shown in Figure 3-1 shows that in addition to structure and technology, an or ganization consists ofpeople and tasks. As some of the examples show, it may be difficult to change an organization if one only attempts to alter its structure. People and tasks may create the greatest challenge for the manager who wants to change the organization. Table 4-4 adds people and tasks to the structure and technology to provide a more complete picture of organization design. The first three organizations in the table are conventional and show typical assumptions about people and task struc turing along with examples. In a rigidly hierarchical organization, tasks are separated and decision mak ing is done within strict guidelines. Tasks are defined by rules and practice to avoid risk. Bureaucracies assume employees need to be motivated so they pro vide elaborate standards and procedures to tell them how to do a job. A profes sional services firm, on the other hand, is based on trust and professional con duct. For example, members of law and consulting firms tend to define their own tasks.
CHAPTER 4: THE I MPACT OF I N FORMATION TECHNOLOGY ON THE ORGANIZATION
TABLE 4-4
93
I
ADDITIONAL DESIGN VARIABLES
Structure and technology (grouping, tasks, jobs, linkages)
People: Assumptions about motivation
Tasks-especially decision making
Rigid hierarchy
People need external motivation
No delegation; tasks designed for employee
Military organizations
Bureaucracy
People want direction and procedures, are not good decision makers
Limited delegation and decision authority
Government, university (administration)
Adhocracy
Trust, professionalism
Loosely defined; individual decides how to best accomplish tasks
Law firm, university (faculty)
Virtual
Trust, self-control
Distributed decision making
Organization of the future?
Negotiated agreement
Trust in partners/alliances
Basic tasks defined in agreement; details left to individuals
Calyx & Corolla flower company
Traditional with electronic components
Mixed, some suspicion and self-control assumed
Tendency to define tasks for lower-level employees; some discretion for managers
IBM
Vertically integrated conglomerates
Control-orientation; individuals in linked organizations expendable
Tasks tend to be designed for employee, even those in linked organizations
GM
Example
From Lucas and Baroudi, 1 994.
The virtual organization has to be based on trust and minimal supervision. We expect that this type of organization will be more common in the future as a num ber of forces, from child care to clean air, argue for fewer, centralized workplaces to eliminate unnecessary commuting. In a negotiated organization, one must trust employees who are in allied com panies. An agreement may specify the required output or level of service, but it will be up to each member of the alliance to accomplish its tasks as it sees fit. The traditional firm with electronic components tends to be large and will treat its employees in a variety of ways. Technology can be used to distribute responsi bility to lower-level managers or to centralize control over the organization. This structure depends on the firm's assumptions about employees and how it defines tasks, especially decision making. The vertically integrated electronic conglomerate is very control-oriented as it drives the systems of a different organization; it avoids the expense, the need for, and the risks of traditional vertical integration. As a result, it tends to specify clearly how the firms connected to it electronically must operate.
94
PART TWO: ORGANIZATIONAL ISSUES
BUI LDING A T·FORM ORGANIZATION
Chapter I introduced the T-Form organization. The IT design variables in Table 4-2 can be used to create organizations with the characteristics described in this first chapter. It is likely that you will use these variables to design organizations and their components. An example below shows how to create a new organization using information technology. People in the T·Form
The pure T-Form organization operates with the assumptions about people found in the virtual and negotiated agreement organizations, where managers base super vision on trust in employees and their self-control. It is not possible to exert close physical supervision. Managers also have to trust partners in business alliances since both partners depend on each other. The details of how people define and ex ecute their tasks is left up to the employee. Decision making is moved to the low est level of the organization where people have the information and knowledge to make the decision. People and tasks are an extremely important component of the T-Form organization. Other Design Possibilities
The T-Form organization is a generic model for a technologically enabled organi zation. The same IT design variables can be used in a variety of ways to create very different types of organizations, all of which have some of the characteris tics of the T-Form. Figure 4-3 presents simple structural models of five different organizations. Frito-Lay is a maj or producer of snack foods like Fritos Corn Chips. The company invested heavily in hand-held computers for its drivers and a satellite
CHAPTER 4: THE I MPACT OF I N FORMATION TECHNOLOGY ON THE ORGAN IZATION
communications network to transmit transactions data to headquarters. The firm developed a data warehouse and provided decision-support tools for district managers to use in planning their operations. The company vests decision rights heavily in senior and lower-level managers; there are relatively few middle-level managers. Mrs. Fields Cookies developed elaborate in-store systems to guide its store man agers in all aspects of the business. The company uses e-mail and voice mail to com municate with the store manager. It also has a very flat control structure with store controllers at headquarters closely monitoring sales results for each retail store. VeriFone is a company that manufacturers devices to verify credit card pay ments and is active in offering electronic commerce solutions on the Internet. The firm views itself as a global corporation. The chairman compares it to a "blueberry pancake where all the blueberries (locations) are equal." Verifone uses technology extensively for communications and coordination in the firm. We have already discussed Calyx and Corolla. Oticon is a Danish manufacturer of hearing aids that underwent a major restructuring when it lost considerable market share. The chairman created a "spaghetti organization" in which an execu tive committee agrees on tasks that the firm must complete and assigns them to a team leader. The leader must put together a team to complete the task; technology facilitates the work of these virtual teams.
FIGURE 4·3
IT-enabled organization forms.
95
96
PART TWO: ORGAN IZATIONAL ISSUES
TABLE 4·5 COMPANY STRUCTURE AND IT DESIGN VARIABLES
Companies/IT design variables
Frito-Lay
Virtual components
Electronic linking and communications
Extensive with route sales force, district managers, factories, distribution centers
Mrs. Fields
Verifone
Calyx & Carolla
Oticon
Presence of Mrs. Fields in each store
Extensive use of teams and alliances
Growers, Fed Ex, and credit card companies
Project teams
E-mail and voice mail; pes in stores
Extensive within company
With growers
Within firm
Technological matrixing Technological leveling
At headquarters
For store controller organization
Minimum structure and hierarchy
Electronic workflows Production automation
Project teams
Global teams to solve problems
With growers, credit card companies Redesign of factory
In store systems
Electronic customer/ supplier relationships
With growers, credit card companies
Table 4-5 shows how each of the firms in Figure 4-2 has used IT design vari ables to create a different structure. These structures help the firms enjoy the ben efits described for the generic T-Form organization; they demonstrate the variety that is possible for the firm choosing to take advantage of technology for organi zation design. Adopting the T-Form: An Example
An example illustrates how IT variables can be applied to the design of an organi zation. Assume that a traditionally structured manufacturing firm wishes to take advantage of new technology to become a T-Form organization. ABZ is an actual company whose name has been changed to protect the innocent and the guilty. ABZ is a manufacturer of electronic components.
CHAPTER 4: THE I MPACT OF IN FORMATION TECHNOLOGY ON THE ORGANIZATION
Currently, ABZ has a very traditional organization structure; it has a headquar ters with a small staff and a number of manufacturing plants in the U.S. and abroad. The largest of these plants is responsible for most information technology in the company. The firm has generally underinvested in technology and is behind its competitors in the industry. Fortunately for ABZ, its products are of high qual ity, and the company has not needed to compete on information technology. Suppose that management has heard about the T-Form organization and would like to adopt it. What could the company do? Table 4-6 shows how management at ABZ could use the IT design variables discussed in this chapter to restructure the company. ABZ is currently being forced into becoming a virtual supplier by its customers who are moving to just-in-time production. ABZ needs to develop the capability to "inquire against" and monitor its customers' production control and scheduling systems so that it can send products without the customer even having to order them. Electronic linking can be used to link production planning, order entry, and marketing. The sales force does not need individual offices. Representatives can use notebook computers and can work from home to concentrate on working with customers. Control can be enhanced by developing information systems which make control information available to various levels of management. Technological leveling is accomplished by reducing layers of management and providing communications tools such as electronic mail and groupware to man agers. ABZ has a large number of administrative support staff members and others not involved in direct production in the factories. It is this support staff that adds overhead and is an excellent candidate for leveling. In the factory, the company has successfully moved toward production au tomation. Expanded efforts should focus on the creation of an electronic manu facturing environment. Orders arrive electronically from customers, and each order generates a bar code to describe the customer and product. When produc tion begins, a worker attaches a bar code to the physical tray that holds the prod uct through the production cycle. At each stage a worker wands the bar code at a workstation to bring up a screen with instructions on what operation to perform. At the end of production after quality testing, the only paper necessary is a label for the shipper. Electronic mail and groupware can be used for technological matrixing. They address the informal communications vital to managing a company. ABZ can quickly form task forces and other informal groups to address problems. This ap proach is particularly valuable for communications among plants. For example, one U.S. plant sends "kits" of a product to be completed to a plant in Mexico. Var ious problems between the plants can be resolved quickly using electronic com munications rather than physically traveling between sites. Technological matrixing also facilitates a reduction in managerial levels as it encourages employees to take the initiative in solving problems. Suppose that a customer contacts a marketing manager to ask if it would be possible to access ABZ's production-scheduling system to schedule products to be built for the customer. In a matter of minutes, the marketing manager, using e-mail and
97
98
PART TWO: ORGANIZATIONAL ISSUES
TABLE 4·6 AN EXAMPLE OF DESIGN FOR ABZ
Class of variables
Structural
Conventional design variables
Definition of organizational subunits
IT design variables
Applied to ABZ
Virtual components
Manage virtual inventory for distributors; connect with customer production systems for JIT; use a common-order entry system for a single point of contact; contract with overnight carrier for all distribution
Determining purpose, output of subunits Reporting mechanisms Linking mechanisms
Use more electronic communications to flatten structure, increase span of control Electronic linking
Develop systems to make control information more widely available
Control mechanisms
Work processing
Link production planning, order entry and marketing; notebook computers for sales force; eliminate private offices for sales force
Staffing
Technological leveling
Reduce the number of layers in the organization by substituting electronic communications and groupware
Tasks
Production automation
Continue efforts at automation
Workflows
Electronic workflows
Move toward total electronic tracking of order; use bar codes to coordinate production with an electronic traveler Coordinate with e-mail and groupware
Dependencies Output of process
I nterorganizational relations
Buffers
Virtual components
Formal channels
Electronic communications
Use e-mail and groupware, especially to communicate among distributed plants and headquarters
I nformal communications/ collaboration
Technological matrixing
Use e-mail and groupware to coordinate on production forecasts and special projects
Make versus buy decision
Electronic customersupplier relationships
Develop a home page on the Internet containing product information; as soon as feasible, use it or a commercial online service to allow customers to inquire on availability; other options would be EDI and groupware
Exchange of materials
Electronic customersupplier relationships
Same as above
Communications mechanisms
Electronic linking
Establish electronic mail links with customers; consider commercial services, EDI, and/or groupware
CHAPTER 4: THE I MPACT OF I N FORMATION TECHNOLOGY ON THE ORGANIZATION
groupware, can form a task force that includes personnel from production plan ning, marketing, information systems, and other interested areas. There is no need to pass this request through layers of management in different departments. ABZ needs to connect electronically to customers to provide them with a vir tual inventory. It can also take advantage of more extensive electronic customer supplier relationships. For example, ABZ can put up a home page on the Web to describe its products and then allow its customers to order from the Internet. What is the result of ABZ's adoption of IT design variables? Extensive use of electronic communications and linking results in fewer management layers and flattens the structure of the organization. Fewer layers combined with the avail ability of information at all levels in the organization will push decision making down to lower levels of management. Easy electronic communications encourage employees to contact appropriate colleagues to solve a problem, rather than refer it up the hierarchy through a supervisor. Employees will be able to take on more re sponsibility and have an IT infrastructure to support them. Some employees, especially the sales force, at ABZ will no longer have offices. ABZ will move toward complete electronic integration with customers and suppli ers. Electronic mail for informal communications, EDI for routine transactions, and in some cases direct links into customer information systems, will increase the firm's responsiveness to customers and suppliers. Electronic workflows in produc tion will eliminate paper and, more importantly, provide better service. Production lots will not get lost if they are tracked electronically and production workers will have accurate information on what tasks to perform for each order.
99
1 00
PART TWO: ORGANIZATIONAL ISSUES
Just-in-time (JIT) manufacturing has become extremely popular in the U.S. given the posi tive experiences that Japan's factories have shown using this approach. Just-in-time is a part of "lean production" and is designed to keep inventory at a minimum. Because there is little inventory, the quality of parts and the dependability of the supplier are critical. An American at Bose Corporation, Lance Dixon, came up with a modification called JIT I I ; he invited suppliers' sales representa tives to sit next to the factory floor and gave them free rein to move about the plant. These representatives can attend production status meetings, visit R&D labs, and access Bose's own production planning and fore casting systems on Bose computers. They can write a sales order of their own. This new approach requires a great deal of trust between the customer and supplier. Not all attempts at establishing JIT II rela tionships have worked, but where they have, there can be many benefits. A Honeywell plant in Minnesota has 1 5 representatives from 1 0 suppliers in cubicles just off the pro duction floor. Some of these representatives
work on new product designs, but most oversee purchases. They think like Honey well employees and look for ways to cut costs. Honeywell runs the factory with inven tory levels measured in days rather than weeks; it also has reduced its purchasing agent pool by 25 percent. Some representa tives will order from a competitor if it is best for Honeywell. In retailing, the same concept is called efficient customer response (ECR); suppliers continuously replenish inventories as the store sells items. Vendors are linked to cus tomer computers which have forecasts and point-of-sale data. The sale of goods "pulls" inventory to the shelves; vendors do not "push" their merchandise on the store. ECR has worked well for some customers and suppliers, but many firms are wary. JIT II and ECR represent different ways of thinking; they are made possible partially be cause of information technology. However, to succeed they require management to support the concept and to create an atmosphere in which customers will trust their suppliers to act in the customer's best interests.
To accomplish this restructuring will take ABZ a long time since it has not kept up-to-date with technology. It will have to invest in a technological infra structure and people to develop the kind of IT applications described in this chapter. ABZ's product quality has helped it attain a commanding market share, and adopting a T-Form organization will help it sustain this position and meet the threats of competitors who currently obtain more from their investment in IT than ABZ. We should add a note of caution: IT is not the solution for every problem. Com petent managers can use the IT design variables presented in this chapter to im prove the organization. They can also use them to create significant problems. For example, a colleague recently reported on a company where a manager only com municates with the staff via e-mail and rarely listens to any of them. It is likely that his strong staff will find other places to work. IT design variables are one ap proach to improving the organization; outstanding managers will use them with good taste to design efficient and effective organizations.
CHAPTER 4: THE I MPACT OF INFORMATION TECHNOLOGY ON THE ORGANIZATION
CHAPTER SUMMARY
1. Information technology interacts with organizations and can be used to change the structure of the organization and/or its subunits. 2. One desirable impact of IT is when technology contributes to organizational flexibility. 3. Older legacy systems often perform critical tasks for the firm. These systems usually run on mainframe computers and are very large and complex. One management problem is deciding if and when to make massive investments to migrate these systems to up-to-date technology. 4. There are a variety of organization structures; some important considerations in studying organizations are uncertainty, specialization, coordination, and interdependence. 5. There are a number of IT-enabled variables that you can use to design organi zations. They supplement and sometimes replace traditional organization de sign variables. 6. These variables can be used to create the T-Form structure or applied to pro duce a range of structures including virtual organizations, negotiated organiza tions, and vertically integrated conglomerates. The variables may also be used in subunits of traditional firms. 7. It is important to remember that organizations and people play an extremely important role in the development and success of technology. IMPLICATIONS FOR MANAGEMENT
It is amazing that a technology barely capable of computing a payroll and process ing orders when introduced in the 1 950s can be the basis today for structuring the organization. The evolution of computers and networks has enabled IT design variables for creating new organizational structures. As a manager, you need to constantly search for ways to improve the organization. IT design variables offer opportunities to make major changes in the organization, changes that can im prove both efficiency and effectiveness. Today the tasks of designing technology and the organization have become one and the same. KEY WORDS
Electronic communications Electronic conglomerate Electronic customer/supplier relationships Electronic linking Electronic workflows Flexibility Mutual dependence Organization Pooled interdependence
1 01
1 02
PART TWO: ORGANIZATIONAL ISSUES
Production automation Reciprocal interdependence Sequential interdependence Technological leveling Technological matrixing Time and space boundaries Uncertainty Virtual components Virtual inventory Virtual supplier RECOMMENDED READING Galliers, R.; and W. Baets (eds)., Infonnation Technology and Organization Transforma tion. Chichester, U.K.: John Wiley & Sons, 1998. (A collection of mostly European au thors writing about organizational change and technology.) Lucas, H. C., Jr. The T-Form Organization: Using Technology to Design Organizations for the 2 1 st Century. San Francisco: Jossey-Bass, 1996. (The story of the T-Form organization. ) Lucas, H. C., Jr.; and J. Baroudi. "The Role of Information Technology in Organization De sign." JMIS, 10, no. 4 (Spring 1994), pp. 9-23. (Presents the IT design variables in detail.) Lucas, H. C., Jr.; and M. Olson. "The Impact of Technology on Organizational Flexibil ity." Journal of Organizational Computing. 4, no. 2 (1994), pp. 155-176. (A paper on which the discussion of organizational flexibility in this chapter is based.) Malone, T.; R. Benjamin; and J. Yates. "Electronic Markets and Electronic Hierarchies." Communications of the ACM, 30, no. 6 (June 1987), pp. 484-497. (A provocative article on the impact of IT on firm coordination.)
DISCUSSION QUESTIONS What kind of technology is least flexible? Most flexible? The information services department is often considered to provide a support function. Can a support department really be powerful? Are there different kinds of power in an organization? 3. What kinds of management problems result from a lack of organizational flexibility? 4. Are there any organizations that are completely dependent on information technology for their operations? 5. What kinds of employees are most likely to be replaced by information technology? How does your answer depend on the type of system and the decision levels affected? 6. How would you measure the extent of unemployment created by the implementation of IT? What factors tend to mitigate the problem of increased unemployment if it actually occurs? 7. What signs might indicate the need to restructure or redesign an organization? 8. Is information technology creating more centralization in organizations? How do you define centralization? Why should technology have any effect at all on the degree of centralization? 9. How would you recognize a company that is using IT successfully? What signs would you expect to find? 1.
2.
CHAPTER 4: THE I MPACT OF I N FORMATION TECHNOLOGY ON THE ORGANIZATION
How can IT be used to create "virtual" organizations? How should managers introduce organizational changes that employ technology? What are the risks? 12. What alliances were key for the nationwide floral company described in this chapter? 13. Consider a typical manufacturing organization and describe the dependencies that exist among departments. 14. Why should users be involved in the design of systems? How much influence should they have? 15. What are the risks for a small company connecting itself electronically with major customers? 16. What are the problems with legacy systems? What are their implications for management? 17. How can IT be used to help design an organization? 18. What are the IT-enabled organization design variables? How do they supplement or re place conventional design variables? 19. What tools does the manager have available to influence IT in the organization? 20. As a user, to whom do you think the information services department should report? Should it be responsible to the finance department? 21. Should an organization that invests in developing an electronic market be free to build biases into the market that favor its own products and services? 22. Early forecasts suggested that middle managers would be reduced in number and stature as a result of information technology. Has this prediction been realized? Why or why not? 23. Does technology have an impact beyond the organization, for example, on stockholders or customers? What kinds of effects occur, and what problems are created for these groups? 24. What is the role of the traditional organization, given the kinds of structures that IT makes possible? 10.
11.
CHAPT E R 4 PROJECT
Knowledge Worker Support The task of supporting computer users in a university is a difficult one. A large number of schools separate academic and administrative computing because it is hard to give academic users attention when the payroll system for the faculty and staff is not working ! Even with a separate academic computing organization, it is often difficult to sup port users. Typically, a school has a number of users of its facilities, and management must try to assist them all-from the student who has never used a PC before to the faculty member who needs the power of a supercomputer. In addition to the problems encountered with mainframes or personal computers in central facilities, the aca demic computing staff may also be responsible for a series of PC laboratories. Develop an organization chart for academic computing at your university. The chart should show the major entities, such as computer centers, the kind of equipment each offers, its users, and so on. Then describe the kinds of user support provided. Is there a help desk? What are the problems with the school's efforts at support? What recommendations can you make to improve the level of support students receive?
1 03
CHAPTER 5
I
i I n
Outline Information Technology and Corporate Strategy
Some Examples of Technology and Strategy The Value Chain Some Generic Strategies A Framework for the Strategic Use of IT Capitalizing on Information Technology Creating and Sustaining a Competitive Edge
Using Resources to Advantage Protecting an IT Innovation An Example of Technology for Competitive Advantage Integrating Technology with the Business Environment Managing Information Technology
A Vision of the Organization and Technology Technology for Structuring the Organization Integrating Technology and Decision Making A Corporate Plan for Strategy Alliances and Partnerships New IT Initiatives The IT Infrastructure Ongoing Management of IT
1 04
I
CHAPTER 5: STRATEGIC ISSUES OF I N FORMATION TECHNOLOGY
Focus on Change
We have already shown how IT can transform organizations and industries when used in strategic applications. Examples in this chapter, plus our earlier discussions of the securities and airline industries, demonstrate the power of modem informa tion technology to change businesses. As technology becomes integrated with strat egy, the nature of business changes. Baxter Laboratories spun off Allegiance, a firm dedicated to providing hospital supplies and to helping hospitals manage their costs through information technology. A few years later, Cardinal Health Care bought Al legiance ! Rosenbluth Travel, a firm discussed in this chapter, changed its focus from providing bookings and tickets to helping a company manage its travel costs through the creative use of technology. Technology and strategy are responsible for major changes in the structure and operations of the organization. •
A recent poll of more than 200 executives showed that they feel information technology is key to a competitive advantage. However, 52 percent of these man agers also feel that they are not getting their money's worth from the technology. Andersen Consulting conducted the study, which involved chief executives, chief operating officers, and chief financial officers representing companies with annual sales ranging from $250 million to $20 billion. This chapter discusses how technology can be used to gain a strategic, competi tive advantage. We believe that many of the problems expressed by the executives in the survey just mentioned come from their failure to actively manage IT in the firm. After we discuss IT and strategy, we present some ideas on how you should manage technology so that it can contribute to corporate strategy. What is competitive advantage? A firm has a competitive advantage when it is able to perform some function "better" than its competitors. Better may mean that it has a superior product, the most efficient manufacturing process, unique knowl edge, or some other capability that its competitors lack. As an example, Intel con siders its knowledge of how to build and operate a semiconductor manufacturing plant a competitive advantage. Some argue that Microsoft's control of the operat ing system provides it with too much of a competitive advantage in selling PC software, especially Web browsers. After obtaining a competitive advantage, the firm faces the challenge of sustaining it as competitors fight back. INFORMATION TECHNOLOGY AND CORPORATE STRATEGY
A key task of top management is formulating corporate strategy. What opportuni ties for new directions are available? What are competitors doing? A firm can con tinue its present course, maintaining momentum where it is doing well. Alterna tively, the corporation can dramatically change its strategy by deciding among competing alternatives for new ventures. What is the role of technology in its strat egy? At Brun Pas sot we saw how IT and strategy become intertwined, with each influencing the other. A well-managed firm will strive for this kind of integration.
1 05
1 06
PART TWO: ORGANIZATIONAL ISSUES
Some Examples of Technology and Strategy
Merrill Lynch is the largest stockbrokerage firm in the United States and plans to become one of the major financial institutions in the world. Two decades ago, funds in a customer's brokerage account earned no interest. There could be cash in such an account because of the sale of stock or because of dividends on stock held by Merrill Lynch for the client. The firm developed a new financial product called the cash management ac count. At the time the product was conceived, interest rates were extremely high and a number of small investors were keeping their funds in liquid assets ac counts. These funds buy and hold large securities with a value of $100,000 or more. The investor buys shares, usually with a par value of $ 1 . The account re quires a minimum deposit, possibly as low as a few thousand dollars. The funds keep the value of the ownership units at $1 by varying the dividends and buying short-term securities. Now the small investor, instead of being limited to bank or savings and loan passbook accounts, can take advantage of higher interest rates previously available only to those with a large amount to invest. (Today banks and S&Ls are able to offer money market accounts, but they were not available at the time Merrill Lynch developed its new account.) The firm decided an account that automatically invested idle cash in Merrill Lynch's own Ready Assets (liquid assets) Fund would appeal to its customers. In fact, the CMA (cash management account) is like a bank account and brokerage account combined. The customer can write checks against the account and even receive a bank charge card. Has it been successful? At first the account was slow to win acceptance, but today Merrill Lynch has more than a million CMA customers. Other brokerage firms have hired Merrill Lynch employees to develop similar products. Merrill Lynch patented the account and asked for licensing fees from other brokers. In an out-of-court settlement, another brokerage firm agreed to pay $ 1 million for hiring a Merrill Lynch employee to set up a similar system. Merrill Lynch gained a significant competitive advantage with its cash management account system. Could this system have developed without confidence in information technol ogy? With a million accounts to update, the magnitude of the catastrophe if com puter systems do not work is hard to imagine. In fact, this product could never be offered unless a firm had computer technology and could manage it. The volume of updating and the short time requirements would be just too great for a manual system. On a smaller scale, information processing technology made it possible for a new market research firm to offer a service it could not obtain from its competi tors. The company developed a strategy that is intertwined with information tech nology. The firm purchased grocery store point-of-sale scanning equipment and, at first, gave it free to 15 supermarkets in two towns selected on the basis of their demographic makeup. There are 2000 households in each of the two test markets using the scanning equipment, and purchases are recorded on the firm's computer
CHAPTER 5: STRATEGIC ISSUES OF I N FORMATION TECHNOLOGY
in Chicago. Since each product is marked with the universal product code, re searchers can pinpoint a family's purchases by price, brand, and size, and then correlate the purchase information with promotions such as coupons, free sam ples, price adjustments, advertising, and store displays. With this technology the company can conduct careful, scientific tests of mar keting strategies to determine the most effective approach for its customers. For example, through cooperation with a cable TV network, the firm can target differ ent TV commercials to selected households and analyze the resulting purchases. The imaginative use of the technology has allowed the firm to gain a competitive lead over much larger, more well-established market research firms. This firm has grown and recently was able to sell the software it developed for analyzing scan ner data for a premium price. These examples illustrate how the integration of information-processing tech nology with strategy formulation expanded the opportunities for each firm. In the brokerage firm, the technology made it possible to offer a new service that helped expand the firm's market share and increased the size of its liquid assets fund. Technology helped the market research firm gain a competitive edge and set a new standard for service in the industry. The Value Chain
Michael Porter at Harvard has popularized the concept of the "value chain," the activities in an organization that add value to its products or services (Porter and Millan, 1985). See Figure 5-1 . The primary activities in the value chain include in bound logistics, operations outbound logistics, marketing and sales, and service. Each of these activities adds value directly to the firm's output. Supporting these
FIGURE 5·1
The value chain.
Finn Infrastructure Human Resource Management Technology Development Procurement
Operations
Outbound Logistics
Marketing and Sales
Service
1 07
1 08
PART TWO: ORGANIZATIONAL ISSUES
primary activities are the firm's infrastructure, human resource management, tech nology development, and procurement. What is the potential impact of information technology on the value chain? IT can create dramatic changes here. Consider Calyx and Carolla from the last chap ter: Growers provide inbound logistics and FedEx is responsible for outbound lo gistics. Two alliance partners, linked by electronic communications in the case of growers, provide important components of the primary value chain. Various credit card companies provide part of the firm's infrastructure, accounts receivable. There are similar examples for all of the activities in Figure 5-1 ; IT can and does have a profound impact on the value chain. Some Generic Strategies
Porter elaborates on his value chain analysis and suggests that firms follow one of three generic strategies: 1. Low-cost producer. Here the firm tries to have the lowest costs in the indus
try so that it can compete on price. 2. Differentiation. The firm tries to separate its product image from that of the competition in such a way that the customer wants its product. Luxury auto mobile manufacturers like BMW are very adept at differentiating their prod ucts from other cars. For example, if you buy a BMW, you are said to have "the ultimate driving machine." 3. Market niche strategy. A number of firms try to find a market niche and ex ploit it. A niche is some part of a market that is not being served by others. Hermes has stayed in its niche of producing high-quality, expensive products like women's scarves for a limited clientele. In today's competitive economy, we have observed firms focusing on more spe cific strategies that are listed below. Most of the time, the firm adopts only one of these, but it is possible to follow two at the same time: Customer Driven Here the firm focuses on its customers. How can we provide better customer service? How can we design products that meet our customers' needs? What technology exists so we can better serve our customers? Customer service is extremely important in commodity businesses, for example, the mail order sales of personal computers. Reducing Cycle Times A firm has a variety of cycle times; a typical one is the length of time it takes to design a new product or service. Detroit automobile man ufacturers and Boeing are focusing on reducing cycle times. They now use parallel design and engineering where tasks are done simultaneously rather than sequen tially. In addition to saving time, parallel development results in better coordina tion among team members working on the design of a new car or plane. Global Competition As the unification of Western Europe continues and Asian economies become more open, some firms have decided to follow a strategy of
CHAPTER 5: STRATEGIC ISSUES OF INFORMATION TECHNOLOGY
Chrysler and Dassault Systems of France have developed a computer-aided manufac turing system that Chrysler hopes will allow it to reduce the time it takes to retool facto ries by 20 percent. The idea is to use the system to create a "virtual" factory so that engineers can design manufacturing tools needed for a new auto model more easily and quickly. Using the new system, Chrysler can retool a factory after approving the de sign for a new model in about 24 months, down from the 30 months that used to be re quired. Chrysler has been a low-cost leader in designing new cars, but it has been lag ging behind Japanese manufacturers and Ford in retoolings its factories. This new sys-
tem extends the computer-aided design tools to actually design the car to the plant floor where it will be manufactured. The Boeing 777 series of planes was the first to enter production directly from design without flight testin g . In addition, Boeing used a computer-aided design system to eliminate paper from the deSign process. The final assembled planes were within 0.023 inches of perfect alignment compared to 0.5 inches on planes designed using paper. In this example, technology is helping with two strategies, cycle time reduction and low cost production.
competing in the global marketplace rather than only in local markets. A firm with global presence will need a variety of technologies to help coordinate and control all its activities. Information technology is a great facilitator for global operations. Right-Sizing In the U.S., the first part of the 1980s was an economic boom, leading to a number of excesses. The late 1980s and the early 1990s were marked by economic downturns and slow growth. To compete in a difficult economy, firms have attempted to determine their "right size." Usually to right-size meant a serious reduction in the number of workers in the firm, and rather large write-offs for restructuring. Blue-chip companies such as IBM have reduced their levels of employment by tens of thousands of workers. Quality Japanese manufacturers gained a large market share in a number of in dustries partially through a fanatical devotion to quality. Many firms around the world are focusing on quality in the hopes of getting ahead of the competition. Quality is an obvious component in the manufacturing sector, but the services firm can also be concerned about the quality of its output. As we shall see in the rest of the text, there are many ways that technology can be used to support the generic strategies just described. A Framework for the Strategic Use of IT
Figure 5-2 shows a framework for IT strategy that arrays a firm's existing applica tions against those that are currently under development (Applegate, McFarlan, and McKenney, 1 999).
1 09
1 10
PART TWO: ORGANIZATIONAL ISSUES
FIGURE 5·2 I nformation systems strategic grid.
Support (chemical firm)
Turnaround (grocery chain)
Factory (distributor)
Strategic (major bank)
Companies that are "located" in the strategic cell are critically dependent on the smooth functioning of information systems. These firms need significant amounts of planning and would be at a considerable disadvantage if information processing did not perform properly. The authors found one bank that fit this cell well. With out computers, the bank would be awash in a sea of paper and could not possibly keep up with the volume. The bank must think of how to use its systems strategi cally to offer services that will let it capture a greater market share. For instance, banks are offering new services connecting home computers to bank computers. In a turnaround company, there is a need for planning, too. It is likely that corpo rate performance is inhibited by poor performance in the information-processing department. Applegate and her colleagues found a firm in this cell with adequate operating systems in production but limited new applications critical for keeping up with growth. Without new technology the firm could not maintain control over its rapidly expanding operations. The authors argue that in the factory setting, there is not much to do but run ex isting applications. They maintain that strategic goal setting and linkage of infor mation systems to the corporate plan are not too important here. Finally, in a support environment, information processing is probably not criti cal to the firm, so strategic integration will not be essential for success. The au thors expect to find low levels of senior management involvement in this situation. This is the position of Applegate, McFarlan, and McKenney ( 1 999) who argue that in the support cell, it is quite appropriate for management to be relatively un involved in information processing. Although this may be true for certain sys tems, the advice is bad in general because it encourages management to ignore information technology and the new opportunities it provides. It is quite possible that a firm in the support cell will be able to come up with a strategic application
CHAPTER 5: STRATEGIC ISSUES OF I N FORMATION TECHNOLOGY
that allows it to gain a competitive edge. In fact, if the support cell position is characteristic of the industry, the firm that first finds a strategic edge through in formation technology may in fact move far ahead of the competition. The framework in Figure 5-2 is a useful one for diagnosing the state of an or ganization. We can look at the nature of the business, its plans for the future, and its existing and planned applications. In a turnaround situation, we may want to emphasize to management the importance of leading the information systems ef fort, whereas in the strategic cell, management may already be aware of the impor tance of technology to the firm. Those authors concerned with the use of information technology as a part of corporate strategy have all taken a slightly different approach to classifying sys tems. One common thread seems to run throughout the discussions: Technology can contribute to a firm's strategy in a number of ways. It can reduce costs to help an efficient firm compete, and technology can tie the firm more closely to suppli ers and customers. The technology can also become a product itself, such as the Merrill Lynch's CMA or an airline's CRS, discussed in Chapter 4. Both of these allowed firms to gain a significant competitive edge. Capitalizing on Information Technology
How does the firm take advantage of information? There are four steps to be fol lowed by top management: 1. Look for ways to incorporate technology in a product or service. Does infor
mation processing provide an opportunity for a new approach to business? Does the technology make it possible to differentiate a product or service from that of the competition? Technology can help open a new market or in crease an existing market share. 2. Seek ways to use technology to connect with other firms. There is great interest in interorganizational systems that link two organizations together. Your firm may be able to connect electronically to its customers so that it is easy for them to order from you. A firm can encourage its suppliers to provide links for plac ing orders. In these instances, the firms in question are drawn more closely to gether, making it difficult for the competition. These links include the Internet, which is becoming the connection mechanism of choice among firms. 3. Lookfor ways to use technology to make dramatic changes in the way you struc ture the organization. Use information technology organization design variables so management can structure an organization that is highly competitive, that uses its technologically enabled structure to become a formidable competitor. IT based structures that focus on one of the strategies described earlier, for example, providing extraordinary customer service, can also provide an advantage. 4. Integrate technology with planning. To integrate technology with planning, managers have to understand ( 1 ) the operation of their business and (2) the ca pabilities of technology. In addition, the firm has to have invested in building a modern technological infrastructure so that it is ready to take advantage of new opportunities. Finally, management has to make information technology a part of its planning process.
111
112
PART TWO: ORGANIZATIONAL ISSUES
One of the greatest impediments to using information technology for strategic purposes is an inability on the part of top management to successfully manage the information systems function. If executives do not believe they can control infor mation processing services, they probably will be unwilling to rely on this tech nology to accomplish strategic goals. CREATING AND SUSTAINING A COMPETITIVE EDGE
There are different schools of strategy that describe how a firm gains and then sus tains a competitive advantage. Theories by Teece ( 1986) and Barney ( 1 991) apply particularly well to the case of using information technology for achieving a com petitive advantage. Using Resources to Advantage
A firm has a number of resources available to it including its employees and their knowledge, capital, products and services, and physical resources that may include a significant investment in a production facility. Some of these resource are likely to give a firm a strategic advantage, but which ones? Resources, according to Bar ney (1991), must be valuable, rare, imperfectly inimitable, and nonsubstitutable to provide an advantage. Otherwise a competitor can develop exactly the same re source without much cost and duplicate your firm's strategy. A resource must be valuable enough that a competitor will think twice before trying to acquire or create a copy. A rare resource is more difficult for a competitor
CHAPTER 5: STRATEGIC ISSUES OF I N FORMATION TECHNOLOGY
to acquire or copy. A strategic resource has to be "imperfectly inimitable" as well to deter creating a direct imitation. A resource has to be nonsubstitutable so that a competitor cannot find an easy substitute in the form of a different, more accessi ble resource that is easy to acquire. Intel is an example of a company with resources that give it a competitive ad vantage. First, it has the knowledge of how to build and produce complex logic chips; Intel regards its ability to build and run a chip fabrication plant as a major competitive advantage. It has the knowledge and engineering resources to create and operate these plants that cost in excess of $1 billion. Intel is also large enough to have the financial resources to build such expensive plants. This combination of resources is valuable, rare, imperfectly inimitable, and nonsubstitutable. Protecting an IT Innovation
Many innovations in IT are virtually impossible to protect from copying. It is diffi cult to copyright or obtain a patent on an application of technology. When FedEx established a Web site to let customers inquire about the status of their shipments, United Parcel followed with a similar Web service within a month. The term "regimes of appropriability" is sometimes used to describe how easy it is to pro tect an innovation. A strong regime means you can protect an innovation, while weak appropriability means that others can easily duplicate your innovation. Most IT initiatives seem to have weak appropriability regimes. While a firm may have the appropriate resources to create an innovation, it can be difficult or impossible to sustain it. There are, however, some conditions that favor the innovator. For example, if you have certain complementary assets (resources) that are unavailable to others, you may be able to protect your innovation. When IBM brought out its first per sonal computer in 1981, it had a strong complementary asset in the form of a mar keting organization with contacts in major corporations around the world. A cospecialized asset is one that has mutual dependency with the innovation. A good example of a cospecialized asset is the relationship between Microsoft's Internet Explorer and Windows 98. The Explorer depends on Windows since it must run on a computer controlled by this operating system; as the Explorer interface becomes a part of Windows, the operating system develops a dependence on this browser. It has been suggested that location can be a co specialized asset in the placement of ATMs; the first banks that installed ATMs were able to get the best locations for them (Dos Santos and Peffers, 1995). There may be ways to use the technology, itself, to strengthen your regime of appropriability; see Clemons and Weber (1991). One of the most popular ways to sustain an advantage is to be the first mover. The first mover may be able to create an insurmountable lead over the competition. Merrill Lynch has many imitators; in fact the "sweep account" is very common in the investment business. However, no one has been able to overtake Merrill Lynch's lead; it has by far the largest number of cash management accounts of any other brokerage firm. Another way to sustain an advantage is to overwhelm the competition with tech nological leadership. United and American airlines have more than 70 percent of
113
1 14
PART TWO: ORGANIZATIONAL ISSUES
the domestic market for reservation systems in travel agencies. These firms had the resources to make large investments in technology and for developing skilled staff members who could implement reservation systems. The companies applied their resources to create the CRSs in the first place, and the CRSs themselves became re sources for competing. Apollo and SABRE today are travel supermarkets that would be extremely difficult and expensive to imitate. By continuously investing in technology and managing it well, these two airlines provide significant barriers to entry for other airlines and vendors of potential reservation systems. (A consortium of several airlines now owns the original United CRS, Apollo.) Closely related to technological leadership is continuous innovation. Successful strategic applications such as the classic American Hospital SupplylBaxter Health Care order entry system demonstrate continuous innovation. Today, with this sys tem, Allegiance, a Baxter spin-off now a part of Cardinal Health Care, offers a service that is the virtual inventory for a "stockless" hospital. IT and a superb lo gistics system let Allegiance promise just-in-time deliveries to different depart ments in a hospital. A final approach to sustaining an advantage is to create high switching costs. By making it very expensive or inconvenient to switch a customer's business to a competitor, you are assured that customers will continue to do business with you. The airline CRS vendors have been very clever at locking in travel agencies. At this time, almost all agencies in the U.S. are automated. Increases in the number of customers and market share only come from converting an agency from a com petitor's CRS to your own. Each CRS vendor has created very high switching costs for an agency to convert to a competitor's CRS. Simply finding a strategic application of technology and implementing it suc cessfully are not enough. This approach should provide a short-term competitive advantage, but the innovator must constantly be searching for ways to sustain an advantage as the competition tries to imitate its success. When planning and devel oping a strategy, think about the kinds of resources you have to provide an advan tage and the difficulties of protecting an IT innovation. Do you have specialized or co specialized assets to enhance the innovation? Can you tum the IT innovation into a resource, itself, that is valuable, rare, inimitable, and nonsubstitutable through some combination of being the first mover, technological leader, continu ous innovator, andlor the creator of high switching costs? An Example of Technology for Competitive Advantage
Clemons and Row ( 1 99 1 ) describe how a small travel agency expanded to a na tionwide business through the use of IT. Rosenbluth Travel, headquartered in Philadelphia, grew from $40 million in sales in 1 980 to $ 1 .3 billion in 1990. It is now one of the five largest travel management companies in the United States and has more than 400 offices. According to the authors, Rosenbluth was extremely effective in taking advan tage of the opportunities offered by deregulation in the travel industry. The firm has used technology to help manage the complexity of modem travel and to obtain economies of scale. Rosenbluth invested in IT over a period of years. While the
CHAPTER 5: STRATEGIC ISSUES OF I N FORMATION TECHNOLOGY
expenditure in any one year was not inordinate, Rosenbluth created a technology base that is extremely difficult for a new entrant or even a competitor to match. Prior to deregulation in 1 976, travel agents wrote about 40 percent of all tick ets. The role of the agent was only to make a reservation and distribute a ticket. Deregulation changed the role of travel agents and forced them to manage the in creased complexity of travel. American Airline's SABRE system contains more than 50 million fares and processes 40 million changes a month. The airline reservation systems used by travel agents were biased toward the airlines, though no more so than one would find calling the airline itself for information. The travel agent, however, could be expected to help the client without a bias toward a particular airline. By 1 985 travel agencies were distributing more than 80 percent of air tickets. Businesses are very interested in managing their travel. It is the third largest ex pense for most firms after payroll and information technology. Firms began to ne gotiate rates with airlines, hotels, and rental-car companies. One of Rosenbluth's major business focuses has been the corporate travel market. See Figure 5-3. The following list of critical technology moves by Rosenbluth illustrates how the firm has used IT for expanding its business: •
•
In about 1 9 8 1 the firm experimented with processing data from airline com puterized reservation systems (CRSs) to provide information for corporate accounts. In 1983 Rosenbluth introduced a product called READOUT that listed flights by fare instead of by time of departure. This program made it possible to see the fare implications of taking a particular flight. The normal flight display was by departure time, and the agent had to move to another screen to obtain fare information.
FIGURE 5·3
Rosenbluth web site.
I> 1999 Business Travel Trel)ds Rosenbluth elq:lerts predict increases in rates around the world,
•
Bps.nbIu!!) In '12K
learn about our Year 2000 initiative and what we're doing to ensure it's bUSiness as usual on
01101100. I>
or should I
Should I stay go? The best method to connect
j;;:t:�:(�:::
'lr"''''I M\l�M'M�rd'MM drun��'
#«'�""''''ttu>IW ''''P '' ''''oa*"",,,�''' mri!\�,�
1 15
116
PART TWO: ORGANIZATIONAL ISSUES
• In 1986 a proprietary back-office system, VISION, created a highly flexible re porting system for clients. The system created a record of transactions made for a client at the time of ticketing regardless of the location of the agency or the CRS in use. This system gave Rosenbluth independence from the data provided by the airline CRS. During 1986 Rosenbluth estimated that it invested nearly half of its pretax profit in the system. The VISION system was more flexible and produced reports about two months earlier than agencies using only the air line CRS. Rosenbluth used VISION to negotiate special fares with the airlines on heavily traveled routes the system identified.
Instead of competing for corporate clients by offering to rebate part of its com missions, Rosenbluth tried to create a cooperative relationship with clients. It promised clients to reduce overall travel costs through lower fares and used VI SION reports to document the savings. • In 1988 Rosenbluth used a new feature in United's Apollo reservation system to support intelligent workstations. PRECISION, the new Rosenbluth system, made client and individual employee travel profiles, and READOUT, the data base of flights listed by increasing fares, were made available to the booking agent. ULTRAVISION was another system that ran with the normal reservation process, monitoring transactions for accuracy and completeness. • During 1 990-9 1 , Rosenbluth began installing USERVISION in its offices. This system lets the user make flexible queries about corporate travel. The data are one day old compared to the 45-day lag typical of the airline CRS data.
These initiatives were part of a tremendous growth period as Rosenbluth's sales increased from $400 million in 1987 to $ 1 .3 billion in 1990 while the number of offices increased from 85 to over 400. The firm has been extremely successful. Business and technology strategy were developed together in an integrated approach to growth. The firm took risks in de veloping new uses of IT and in-house expertise to successfully implement sys tems. Rosenbluth's technology strategy competes through value-added services rather than being the low-cost producer through rebates. It also took advantage of technology to market new services to its clients. The company meets jointly with its clients and service providers to help the client negotiate the lowest possible fares. INTEGRATING TECHNOLOGY WITH THE BUSINESS ENVIRONMENT
One of the most significant management challenges during the coming decade will be to integrate business and technology. It is no longer adequate to think about technology after other business decisions have been made. Instead, managers must consider how technology affects their decisions and how their decisions affect the technology. Figure 5-4 describes how a manager can integrate technology with decision making. First, the manager has to search for new technology to help create new
CHAPTER 5: STRATEGIC ISSUES OF I N FORMATION TECHNOLOGY
FIGURE 5-4
The management challenge of integrating information technology.
business opportunities. These opportunities, combined with the technology itself, lead to new development projects. The development projects are influenced by technological constraints. The firm cannot undertake a new marketing program in which customers inquire about their orders from the Internet if the firm lacks the skills to set up a home page on the World Wide Web and integrate the page with its existing order-entry system (see Chapter 12). The box at the bottom of Figure 5-4 represents decision making, planning, and execution of decisions. Technological constraints and opportunities influence these decision-making activities. A firm cannot provide customers with inquiry capabili ties until it allocates resources to develop a Web site. Management's decisions in fluence how it manages the existing business and technology. A decision to under take a major factory automation project will result in a different type of production process to manage.
117
1 18
PART TWO: ORGAN IZATIONAL ISSUES
Successful managers must be able to integrate their knowledge of information technology and their business knowledge in making decisions. The manager should be aware of the opportunities provided by the technology and the con straints that already exist for the firm in developing new technologies. The man ager should also recognize that as decisions are made, the alternatives chosen will have an impact on technology and its development within the firm. The next sec tion presents a framework for this task of managing information technology. MANAGING INFORMATION TECHNOLOGY
Figure 5-5 shows a framework for managing information technology. The arrows in the figure show the relationship between actions in the boxes for managing and controlling technology. The first step is to develop a vision for the organization and information technology. Next the senior manager looks at how technology can contribute to the structure of the organization using the IT design variables dis cussed in the last chapter. The structure of the organization influences and is influ enced by corporate strategy. Strategy, structure, and the integration of IT into the firm help generate a plan for technology. This plan includes a structure for the IT subunit(s) in the organization along with a hardware/software/network architecture for the firm. The plan describes what new applications and what resources are needed to operate existing technology. It also describes the sources of services, for
CHAPTER 5: STRATEGIC ISSUES OF I N FORMATION TECHNOLOGY
FIGURE 5-5 A framework for managing information technology.
example, from within the firm or from an outside source. Finally, the plan contains information on how management will control the technology effort. A Vision of the Organization and Technology
Visions are rare and difficult to create; leaders are frequently criticized for lack of vision. An American president, concerned over sagging popularity in the polls, re marked that it was "that vision thing" that was responsible for his ratings. For an organization, the vision thing is important, especially given the ability of technol ogy to change the structure of the firm, the nature of its business, and the basis for competition. A fundamental responsibility for management is to develop a vision for the business and for the role of information technology in achieving that vision. The vision should describe the mission of the organization and identify the products and services it produces. It should identify the markets in which the firm will compete and its strategy for competition. Plans for mergers, partnerships, al liances, and acquisitions are all part of a vision. Information technology is likely to play an important part in shaping the structure of the organization and in sup porting its value chain activities. Technology for Structuring the Organization
In Chapters 1 and 4 we discussed the use of information technology design vari ables in structuring the organization. Because a firm's structure is highly interre lated with its strategy, these two aspects of the organization must be considered to gether. For example, a firm might decide to compete on the basis of extremely efficient operations, to become the low-cost, low-overhead producer in its industry.
1 19
1 20
PART TWO: ORGANIZATIONAL ISSUES
This firm might use production automation to reduce costs and improve quality. It could use electronic customer-supplier relationships to process electronic orders from customers on a just-in-time basis and to order in a similar manner from its suppliers. The firm could employ technological matrixing to form electronically linked project teams to develop new products and services in parallel. To minimize overhead, it could employ electronic communications and linking with its sales force, providing them with electronic devices such as notebook computers with fax modems, wireless communications, and cellular phones in place of a physical office. Strategy and structure must be considered together. Beyond the adoption of a generic strategy such as becoming the low-cost producer, management wants to develop technology that will give the firm a competitive edge. The most difficult part of gaining such an advantage is coming up with an idea. No text can teach creativity or give a formula for it. By reviewing what competitors are doing, stay ing abreast of the technology, and looking for analogies in other industries, you can develop new ideas for strategic advantage. It is likely these strategies will include the development of interorganizational systems and alliances with other firms. For a manufacturing firm, IT strategy might involve technology embedded in a product, such as the computer chips found in automobiles to control the engine and exhaust, antilock brakes, traction control, and similar functions. A services firm might look for ways technology can add value to existing services, make it easier to do business with the company, re duce cycle times, lower costs, and make the other contributions discussed in the first part of this chapter. You also need to consider an Internet policy and presence on the World Wide Web. (We defer a discussion of this topic until you have read about the Internet and the Web in Chapter 12.) Integrating Technology and Decision Making
A significant responsibility of management is to integrate technology with all business decisions. Integration means that the manager is aware of how new tech nology can create opportunities. The technology can literally change the way a firm does business. Concomitantly, the manager has to be aware of the impact of decisions on the firm's technology. A decision to enter a new line of business has a direct effect on existing information-processing systems. For example, the creation of frequent flyer programs had a dramatic impact on computerized reservation systems. At least one major airline required flyers to attach a sticker to tickets to get mileage credit some two years after its frequent flyer program began. The airline finally was able to modify its reservation system to keep track of the miles when the traveler made the flight! A Corporate Plan for Strategy
A corporate strategic plan comes from the firm's vision for its future activities. This plan includes the vision; it is a road map for bringing about the vision. Rather than a separate plan for information technology, IT should be an integral part of
CHAPTER 5: STRATEGIC ISSUES OF IN FORMATION TECHNOLOGY
a Citibank is a pioneer in electronic banking; it was one of the first to introduce electronic banking in 1 985! Its early systems were new interfaces connected to legacy, mainframe systems. They were ponderous and slow to develop. Now, the mainframes keep every kind of account in a different system, for ex ample, a system for checking accounts, for mortgages, for personal loans, etc. I nstead of fitting a customer to a system, the bank wants to provide a range of services for each customer. Citibank merged with Travelers to form Citigroup; after the merger the combined company serves 1 00 m i l lion customers. The company has a bold goal of having a billion customers worldwide by 201 0. Man agement realized that electronic banking would be necessary to reach this kind of customer base; it also understood that its cu rrent electronic banking systems were too old, slow, and limited to accomplish its objectives. Enter the Internet. A new technology offi cer made the decision to convert completely to the I nternet for providing banking ser vices globally. Not only will the interface for the customer be new, the bank is planning
to replace the core of its back-office com puter systems that maintain customer ac counts. The original system has required an investment of hundreds of millions of dol lars. Citigroup feels it must undertake this investment to catch up with the nimble new Internet companies like E-Trade. The bank is taking a major risk with this strategy as its back-office systems are complex and mas sive; they must work right or the bank could lose customers by the thousands. Of course, there are offsetting gains if the bank is successful. Executives estimate that the cost of acquiring a customer over the In ternet will be 20 to 50 percent of the cost through traditional marketi n g . The bank should also only incur costs of 1 0 to 20 per cent of a branch customer in serving an electronic customer. The rapid pace of technological change makes it difficult to retain leadership if IT is a part of your strategy. Citigroup is now plan ning a major, discontinuous change to pre pare for a new business model: a worldwide electronic bank and financial services com pany. If it is successful, the bank will have transformed itself into a formidable, global competitor.
the firm's strategic plan. Given the contents of the corporate strategic plan, it is possible for managers in the IT function to develop a more detailed IT plan to sup port the corporation. Many organizations agree that a plan is needed yet do not develop one. A fre quent reason given is that the three-to-five-year information systems planning horizon is not compatible with the planning horizon of the organization. Yet it is both possible and highly desirable to develop an information technology; the tech nology is too pervasive and important for planning to occur by default or solely through decisions made by personnel in the information services department. We return to the topic of planning in Chapter 24. Alliances and Partnerships
Companies today form a variety of partnerships and alliances if the information technology industry is any example. In fact, firms sometimes form alliances in one
1 21
1 22
PART TWO: ORGANIZATIONAL ISSUES
area with a company they compete with in some other aspect of business. Intel and Microsoft have a long history of cooperation, but Intel is also working to produce chips that run competing operating systems. Honda places a new badge on an Isuzu Rodeo and sells it as a Honda sport-utility vehicle; Acura does the same with an Isuzu Trooper. If another organization has a product or service that enhances your offerings or your operations, it can be very appealing to work with them. In formation technology facilitates these kinds of cooperative arrangements by pro viding electronic linking and communications. New IT Initiatives
Few organizations ever stop developing new information technology initiatives. As technology advances, it seems to stimulate new ideas on how to use IT to improve some aspect of the organization. The corporate strategic plan should identify broad areas in which technology can contribute to the firm. An IT plan adds further de tails and identifies specific applications of the technology for development. Rarely today does anyone suggest completely unfeasible applications. Instead, a system that will be feasible can usually be undertaken to improve the organiza tion. The question is, what system is both feasible and desirable? A corporate steering committee should choose applications areas as a part of developing a plan for information processing. The task then is to choose what type of system, if any, will be developed. Management must consider the existing portfolio of applica tions and provide guidance on the amount of investment possible and the balance of the portfolio. Systems development is an area that requires a great deal of management atten tion. Managers must demonstrate that they are behind the development of a new system and see that there is adequate user input in the design process. Frequent group review meetings are important during the design process. Top management must participate in these meetings and make clear that it supports the changes likely to come from the system. Later in the text, we discuss system analysis and design in more detail, along with how the organization can implement successful systems. The IT Infrastructure
In the next section of the book, we discuss information technology in some detail. The combination of the firm's various common technologies constitutes informa tion infrastructure. For example, the organization provides networks to which vari ous computers are connected. It would not make sense for individual users to each develop their own network or choose a different provider of network services. Some experts define the infrastructure as limited to common facilities the firm provides, like a network; this view of infrastructure is similar to that of society at large in which governments provide infrastructure such as roads and airports. Oth ers take a broader view of infrastructure and define it as the firm's existing stock of technology that is available to users. Infrastructure is extremely important be cause it facilitates the development of new IT initiatives. If you wish to develop an interactive application available to all employees, the time and effort required will vary dramatically depending on whether the firm has an Intranet in place.
CHAPTER 5: STRATEGIC ISSUES OF I N FORMATION TECHNOLOGY
Ongoing Management of IT
Visions and strategy are long term in nature; the firm still faces the day-to-day task of managing information technology. This work consists of two different kinds of tasks: developing new applications and operating the existing stock of applica tions. We shall discuss systems development later in the text. What does opera tions involve? Consider Morgan Stanley, a leading investment bank and a major force in re tail brokerage through its merger with Dean Witter in 1 997. The investment bank's technology (without its new acquisition) is a 24-hour-per-day, seven-days a-week operation. There are 15,000 computers used to process 100,000 trades a day. The firm has an estimated 100 million lines of software code and an Intranet with 10,000 users. Each night, its batch-processing cycle executes 34,000 jobs. Morgan Stanley is a services firm and much of its business is information pro cessing. Its "factory" is the IT division, which managers must be sure operates reliably and within deadlines so that the firm is able to "make its products" every day.
1 23
1 24
PART TWO: ORGANIZATIONAL ISSUES
CHAPTER SUMMARY 1. The value chain identifies activities that contribute to the firm's products
and/or services. 2. There are three generic business strategies including being the lowest cost producer, product differentiation, and marketing of niche products. 3. More specific business strategies include being customer driven, reducing cycle times, competing globally, and right-sizing. 4. Theories of resource-based advantage and protecting innovation can help es tablish and sustain a competitive advantage through technology. 5. IT strategy and organization structure are closely related; management can use IT design variables to create an organization structure to accomplish its strategy. 6. To use IT strategically, you have to be able to manage the technology. The first step in management is to develop a corporate strategy that incorporates information technology and to design the organization using IT. 7. The technological infrastructure-the pattern of hardware, software, and net works in the firm-is an important management consideration; the infrastruc ture plays an important role in determining the firm's flexibility in undertak ing new technology initiatives. 8. Other IT management considerations include choosing applications and the day-to-day operation of the stock of existing systems. IMPLICATIONS FOR MANAGEMENT
Applications that generate the most excitement are those that provide the firm with a strategic advantage. I was once asked by a company president to come up with a strategic system for his company. As you might guess, this request was not partic ularly welcome. An outsider may be able to suggest a process for finding a strate gic application, but the actual application will come from within the firm. In fact, it is probably most likely to come from a general manager not working in IT. A number of strategic applications have evolved from rather routine transactions processing systems. Airlines developed their reservations systems to solve the reservations problem. When they put the systems in travel agencies, they realized the strategic value of this transactions processing system. American Hospital Sup ply began its order entry system because it was having trouble providing supplies to a hospital in California. The best place to look for a strategic application may be among the applications you already have in place. KEY WORDS
Customer driven Cycle times Differentiation Low-cost producer Market niche strategy Plan
CHAPTER 5: STRATEGIC ISSUES OF I N FORMATION TECHNOLOGY
RECOMMENDED READING Applegate, L.; W. McFarlan; and J. McKenney. Corporate Infonnation Systems Manage ment, 5th ed. Homewood, IL: Irwin McGraw-Hill, 1999. (A good book for managing in formation processing.) Baker, R.; R. Kauffman; and M. Mahmood. Strategic Information Technology Manage ment. Harrisburg, PA: Idea Group Publishing, 1993. (An excellent collection of articles about the strategic use of IT.) Clemons, E. K. ; and M. Row. "Information Technology at Rosenbluth Travel," ]MIS, 8, no. 2 (Fall 1991), pp. 53-79. (An interesting discussion of the growth of a small busi ness analyzing the contribution of information technology.) Copeland, D.; and J. McKenney. "Airline Reservation Systems: Lessons from History," MIS Quarterly, 12, no. 3 (September 1988), pp. 353-370. (An excellent history of computerized reservation systems and competition among airlines using information technology.) Dos Santos, B . ; and K. Peffers. "Rewards to Investors in Innovative Information Technol ogy Applications: First Movers and Early Followers in ATMs," Organization Science, 6, no. 3 (May-June 1995), pp. 241-259. (A study of whether innovative banks gained an advantage from early investments in ATMs.) Mata, F.; W. Fuerst; and J. Barney. "Information Technology and Sustained Competitive Advantage: A Resource-Based Analysis," MISQ, 19, no. 4 (December 1995). (An arti cle applying resource-based views to the IT function.)
DISCUSSION QUESTIONS 1. Locate
an article in the popular business press about the strategy of a corporation. De scribe the interrelationship between technology and the strategy of the firm. Compare two firms and note the differences. 2. Why did most firms first develop systems to improve operational efficiency? 3. How can a firm sustain a competitive advantage? 4. What is the first mover advantage? Give an example of a firm that has achieved such an advantage. 5. How can users evaluate the quality of service from an information services department? 6. What are the characteristics of a resource that helps a firm obtain a competitive advantage? 7. What structural features of the organization influence the structure of the information services department in the firm? 8. What are regimes of appropriability? How do they apply to IT innovations? 9. Why do you think firms might have trouble simultaneously following more than one or two of the generic strategies described in this chapter? 10. How does strategic planning differ between a firm that offers services and one that manufactures a product? Is there a difference in the impact of technology on strategy in the two types of firms? 11. How can management assess the probable information-processing technology available over the next five years? 12. What criteria are the most important for an organization in choosing among competing alternatives for a particular application? 13. Why should the decision of what applications to undertake not be left to the manager of the information services department? 14. What do you think the role of top management should be in the design of a specific in formation system?
1 25
1 26
PART TWO: ORGANIZATIONAL ISSUES
15. Some
senior executives feel that they do not receive a return on their investments in technology. What factors might account for this feeling? Do you think they are right? 16. It has been said that problems with information technology start at the top of the orga nization. What does this mean? Do you agree or disagree? Why? 17. Why do priorities have to be set for new uses of IT? 18. What are specialized and cospecialized assets? How do they apply to sustaining an ad vantage with technology? 19. What strategies did American and United airlines follow to enhance and sustain the ad vantage provided by their reservations systems? 20. What actions can management take if information technology activities seem to be out of control? 21. What is the role of external expertise in the development of a strategy for information technology? 22. What should a vision for a firm include?
CHAPTER 5 PROJECT
Strateg i c Adva ntage Developing systems for strategic advantage (or calling them strategic) has become very fashionable. As the examples in this chapter suggest, it is unlikely that what is strategic today started out that way. Companies developed systems for one set of reasons. Later they saw extensions that turned the systems into strategic or com petitive applications. When an organization exists to make a profit and functions in an industry with competitors, it is relatively easy to look at a system and determine that it is strate gic. What happens in the case of a different organization, such as a university? Can you identify the "competitors" of your university? How can information tech nology be used to make your institution more competitive?
CHAPT E R 6
I
I nd I
I
Outline The Impact of Globalization on Business International Business Strategies
Multinational Global International Transnational Key Issues in an International Environment
Information Needs Implementing International IT Managing Information Technology Internationally
Concentrate on Interorganizational Linkages Establish Global Systems Development Skills Build an Infrastructure Take Advantage of Liberalized Electronic Communications Strive for Uniform Data Develop Guidelines for Shared versus Local Systems Three Examples Standard Pharmaceuticals International Asea Brown Boveri VeriFone Transnational Virtual Firms and IT
1 27
1 28
PART TWO: ORGANIZATIONAL ISSUES
Business Models and IT Management
Independent Operations Headquarters Driven Intellectual Synergy Integrated Global IT The Internet, Imperialism, and Developing Countries
Focus on Change
Businesses are turning themselves into global concerns. Information technology is an important tool in making this transformation and in designing the international organization. As tariffs fall, you can expect to see firms rapidly moving operations to different parts of the world to take advantage of special competencies and dis parities in wage rates. Even a one-person company can have worldwide sales through the Internet! One researcher who studies international business suggests that information technology is the glue that can hold an international organization together and help coordinate its operations. All of our IT design variables that focus on communications, such as electronic links, technological matrixing, elec tronic customer/supplier relationships, and virtual components, are available to help manage and coordinate the global firm. •
Globalization has been one of the major trends in business in the last decade. It is estimated that 579 global corporations account for about 25 percent of the world's production. These companies range in size from $ 1 billion to $100 billion. The world's strongest economies are heavily trade oriented. The United States has been actively promoting free or reduced tariff trade, though some labor groups and members of Congress oppose this campaign. Chronic trade surpluses in Japan have focused attention in other countries on world trade and on lowering barriers to trade. The European Economic Community (EEC) has eliminated almost all barri ers to trade and has adopted a common currency, the Euro. The U.S., Canada, and Mexico have completed the NAFTA free-trade pact that will phase out most tariffs over a 15-year period. The consensus among economists is that free trade will eventually benefit all countries that participate. There are also emerging markets in Eastern Europe and the Commonwealth of Soviet States. Recent financial crises in Asia and Latin America may slow the liberalization of trade and global economic activity, but it is unlikely to stop it. Globalization can greatly complicate the task of managing IT in a firm. Yet, IT can greatly improve the management of firms with operations in many parts of the world. THE IMPACT OF GLOBALIZATION ON BUSINESS
There are a number of impacts of globalization (Ives and Jarvenpaa, 1992): • Rationalized manufacturing. Firms manufacture in locations with a comparative advantage for the type of manufacturing involved.
CHAPTER
6:
INTERNATIONAL BUSIN ESS AND I N FORMATION TECHNOLOGY
• Worldwide purchasing. Firms can purchase worldwide for their operations, giv ing them a great deal of leverage over suppliers. • Integrated customer service. A multinational firm is likely to have multinational customers and can provide all locations with the same level of customer service. • Global economies of scale. Size, if managed properly, provides for economies in purchasing, manufacturing, and distribution. • Global products. Consumer firms have worked especially hard to market global brands such as Kellogg's cereals and beverages like Coke and Pepsi. • Worldwide roll-out of products and services. The firm can test products and services in one market and then roll them out around the world. • Subsidizing markets. The profits from one country can be used to subsidize op erations in another. • Managing risk across currencies. With floating exchange rates, doing business in many countries can help reduce risks. • The growing irrelevance of national borders. Technology has far outpaced polit ical progress in integrating different cultures. As electronic commerce plays an increasingly important role, the ability of national governments to control trans actions will become more difficult.
One conclusion from the above list is that global business creates greater uncer tainty and complexity. To handle these challenges, the firm will need faster com munications and information processing. It will have to rely more on IT to manage the organization. INTERNATIONAL BUSINESS STRATEGIES
Four major types of international business strategies are portrayed in Figure 6-1 (Bartlett and Ghoshal, 1989). FIGURE 6-1
Global business strategies.
1 29
1 30
PART TWO: ORGANIZATIONAL ISSUES
Multinational
The multinational strategy focuses on local responsiveness. Subsidiaries oper ate autonomously or in a loose federation. The advantage of this type of ap proach is that the firm can quickly respond to different local needs and opportu nities. This strategy reduces the need for communications because local subsidiaries can make many decisions. There are heavy reporting requirements though because the results from the subsidiaries have to be monitored at a head quarters location. Global
A global strategy stresses efficiency because there is strong central control from headquarters. Economies come from standard product designs and global manu facturing. An extensive communications and control system is necessary to cen trally manage the global firm. International
The international strategy is much like the multinational as there are autonomous local subsidiaries. However, these subsidiaries are very dependent on headquarters for new processes and products. A good example is a pharmaceuticals company. The research labs in the headquarters company develop products for introduction around the world. Local subsidiaries stress product approval by local governments and local marketing. Transnational
The transnational firm attempts to do everything ! It seeks global efficiency while retaining local responsiveness. The firm integrates global activities through coop eration among headquarters and foreign subsidiaries. This difficult strategy tries to achieve local flexibility at the same time that it obtains the advantage of global in tegration, efficiency, and innovation. We predict that the various types of firms will tend to strive toward the transnational model over time. KEY ISSUES IN AN INTERNATIONAL ENVIRONMENT Information Needs
An international corporation needs information to coordinate and control its di verse businesses. Reporting and early-warning systems are very important in this environment. Systems that summarize sales data and process accounting informa tion are necessary, but they only reflect what has happened in the past. These sys tems represent traditional uses of IT for reporting and control. Technology offers the international firm many more active tools to help manage the business. Coordination is a major problem for the global firm. IT provides a number of approaches to improving communications and coordination, for exam ple, e-mail and fax. The emergence of groupware products is very important to in ternational business. These systems let workers in different locations create a shared, electronic environment. Intranets encourage the sharing of information and
CHAPTER
6:
I NTERNATIONAL BUSINESS AND I N FORMATION TECHNOLOGY
a An Intranet uses Internet technology to share information; access is restricted to the mem bers of one organization. As an example, Medtronic, Inc., a medical device manufactur ing firm in Minneapolis, has created an In tranet that ties together 1 3,000 employees in 60 countries. The Intranet provides reports for employees on worldwide customers, products, and special interest groups. M ultinational companies are using Intranets to streamline distribution networks that cut across national boundaries, to spread common applications and business processes, promote company values, and to collect competitive information from distant markets. Intranets can become part of the glue that brings an organization to gether, says one consultant. Continental Airlines has a global I ntranet it calls the Electronic Service Center. The applications on the Net allow Continental to streamline operations at airports and operat ing centers around the world. Workers will be able to arrange time off and trade hours with others online. The company is making its flight profitability system available on the Intranet so that managers in foreign coun tries can get up-to-the minute information about which flights are profitable. Such a system will be especially valuable to man agers on Guam where Continental Microne sia, a subsidiary, is based.
Pfizer is using its I ntranet to give employ ees in 70 manufacturing plants in 30 coun tries access to ove r 2 5 0 , 000 Material Safety Data Sheet documents containing detailed data on chemicals used i n produc tion. EDS uses its I ntranet to help share its value system around the world. Its 1 00,000 employees in 42 countries access the sys tem . The fi rst application describes the company's community affairs program that involves EDS applying technology to aid local c o m m u n ities. This content w i l l be available in 1 1 languages. Marine Power Europe, a division of out board engine manufacturer Mercury Marine, has an I ntranet-Extranet (allowing people outside the company access) that has cus tomer credit, warranty, and order-processing information available in eight languages. Branch offices in nine countries as well as 20,000 independent dealers access the Net. The network has allowed Mercury to central ize much of its dealer support in Belgium. The Intranet cost $600,000 to develop, and the company expects it to save $ 1 .2 million a year. Internet technology has the potential to help coordinate the operations of a global firm, an important contribution to company success.
provide for coordination as well. For example, the design studios in different parts of the world of a car manufacturer can work on developing the same new automo bile. Each studio posts its most recent design drawings on the company's Intranet, making them instantly available to designers in different locations. The Intranet provides the mechanism for coordinating the diverse design groups. As discussed in Chapter 4, the manager can use IT in a variety of ways to design the structure of the global organization. We can see that technology plays a crucial part in the de sign and operation of international firms. Implementing International IT
The ultimate objective for the global firm is to process data anyplace in the world and share information without having to worry about the type of platform used for
1 31
1 32
PART TWO: ORGANIZATIONAL ISSUES
processing. What kinds of problems do you encounter trying to achieve this objec tive in an international environment? (For a discussion of some of these issues, see Deans and Kane, 1992.) The following section outlines some of the typical prob lems faced by a manager of a global organization. The first problem is managing local development when the foreign unit does not coordinate with headquarters. The foreign subsidiary may be duplicating de velopment efforts under way in other parts of the world. It also may not have a tal ented staff and may end up with poorly conceived and designed systems. The question of headquarters-subsidiary coordination and management is a central one in pursuing an international corporate strategy. The counter argument from the local company is that it knows the needs in its location. A distant headquarters unit cannot set specifications for foreign coun tries. This contention leads to the second development issue: How does the firm develop a set of common systems shared across different countries to take advan tage of economies of scale? Headquarters does not want each country to develop its own accounting and sales reporting systems. Different countries have different laws and regulations, so it may be impossible to share programs among foreign locations without making special modifications for unique requirements in each country. The third development problem is that when designing applications, there are real and perceived unique features in each country. Designers, especially those representing headquarters, must recognize what features are required for a system to work in a country and what features are there as an exercise in local indepen dence. For example, Straub ( 1994) studied the use of e-mail and fax in Japan and the U.S. He found that cultural differences predisposed managers in each country to a choice of communications vehicles. Straub suggests that high uncertainty avoidance in Japan and structural features of the Japanese language explain why Japanese managers have a lower opinion of the social presence and information richness of e-mail and fax, though American and Japanese managers rated tradi tional communications media like the telephone and face-to-face communications about the same. Managers must also be aware that more and more firms want to build a worldwide communications network to take advantage of communications and coordination tools to move data freely around the world. This effort can be a major challenge because of different technical standards and regulations. Cer tain countries regulate the kind of telecommunications equipment that can be used on their network. In a number of foreign countries, PTT (postal, telegraph, and telephone) monopolies regulate communications and may restrict the abil ity to transmit data. Some underdeveloped countries may not have adequate communications capabilities to support private networks. Countries also may prohibit importing certain kinds of computer equipment in order to protect do mestic competitors. Different kinds of communications networks and standards can greatly increase the difficulty and cost of building worldwide communica tions capabilities. One of the most attractive features of the Internet is that it
CHAPTER
6:
I NTERNATIONAL BUSINESS AND INFORMATION TECHNOLOGY
has open standards and a presence in almost all countries. It is pervasive in Asia and the West and has much less penetration of Africa and the Middle East (ex cept Israel). A number of government requirements may impede the development of global information systems (Steinbart and Nath, 1 992): 1. A requirement to purchase specific equipment in the foreign country that may
not be compatible with the equipment used by other parts of the global firm. 2. A requirement to do certain kinds of processing in the host country before data can be sent electronically to another country. 3. Restrictions on the use of satellites and special requirements for building pri vate networks. 4. Limited access to flat-rate leased lines or a requirement that all transmission be made on variable cost lines. 5. Restrictions on Internet access and efforts to censor Web sites. A sixth major issue arising from international IS efforts is transborder data flows. Moving data across a boundary may be curtailed by government regula tion, ostensibly to protect its citizens and their privacy. Another impact of regu lation is to reduce the economic power of foreign companies or limit the impo sition of foreign culture on the host country. Many of the transborder regulations seem to be motivated by a desire to protect local industry. Countries may have a legitimate concern about the privacy rights of their citizens. This reason is probably cited most often for instituting data controls. To implement control, a country can establish regulations through its telecommunications ministry, levy tariffs, and/or require formal approval of plans to process data in the country. Examples of barriers to data flows include: • Restrictive regulations that require processing of data originating in a country in that country only, making it difficult to transmit and share data. • Exorbitant pricing of communications services by government-owned post, telephone, and telegraph ministries. However, a wave of "privatization" is sweeping countries and many PTTs are becoming private or quasiprivate companies. • Attacks on computers by various hackers throughout the world have pointed out how difficult it is to secure networked computers.
As with any international venture, language and cultural differences can also present a challenge to developing IT on a global scale. Time differences can make communication difficult for different parts of the world, though fax and e-mail have eased this problem considerably. Some firms stress joint develop ment teams with representatives from different countries to avoid problems stemming from developing a system in any one country or language. Foreign subsidiaries may be more willing to adopt an international system developed by a cross-cultural team.
1 33
1 34
PART TWO: ORGAN IZATIONAl ISSUES
Ford Motor Company has business loca tions in the U.S., Europe, and Asia. It has d e s i g n centers in D e a r b o r n , M ic h i g a n , Ford's headquarters, Valencia, California, and five other centers in Cologne, Germany; Dunton , England; Turin, Italy; Hiroshima, Japan; and Melbourne, Australia. Ford has launched a "Studio 201 0 Computer Aided I ndustrial Design" unit in Dearborn. The ob jective of this project is to establish interac tive video l i n ks among the seven design centers to facilitate collaboration among its engineers. Designing a new car today costs in the billions of dollars; Studio 201 0 is de signed to reduce that cost while encourag ing collaboration among Ford designers worldwide. Currently there are high-speed data l i n ks between Dearborn , Valencia, England, and Germany. The company plans to share multimedia information in videoconferences. A presen tation might include videoclips and three d i me n s i o na l i m ages developed on t h e computer-aided design workstations. Ford is a good example of information technol ogy being used to coordinate a global firm; regardless of where an engineer sits or in what time zone he or she works, it is possi ble to contribute to a design project. Linking the world together was a logical step after Ford's engineers had been equipped with computer-aided design workstations. These
workstations contributed to the productivity of the individual engineer; the communica tions links will contribute to the productivity of the team that is workin g on a design project. Ford is also using technology to out sou rce some of its design activiti es. The company has plans to turn over more than half of its new auto design efforts to parts suppliers. Ford is linking several h undred suppliers around the world to its computer aided design and manufacturing system so they can be a part of an interactive design process. Ford's objective is to tap the ex pertise of its suppliers rather than try to du plicate that expertise within the company. The system works through file transfers and e-mail notification. As an example, a seat supplier sends the design for a new assembly from a U n i x workstation from Japan to the Ford product data manage ment system where the plans go i nto a product design database. The system noti fies all concerned parties through e-mail. A Ford engineer then reviews the design to be sure it will fit as specified; if there are any problems, he or she sends the designer a file with data on the surrounding parts of the car. Here, technology is being used to coordi nate diverse individuals and companies to form a "virtual" design team for Ford.
MANAGING INFORMATION TECHNOLOGY INTERNATIONALLY
What can the manager do to solve the problems raised above? Some of these im pediments to IT require political action or deregulation, for example, the policies of foreign PTT utilities. In other instances, management has to take action to solve problems, and managers have to be involved in efforts to develop systems that will be used in multiple countries. It is management that has to sell its vi sion for the firm's global technological infrastructure and resolve conflicts over IT requirements.
CHAPTER 6: INTERNATIONAL BUSINESS AND I N FORMATION TECHNOLOGY
TABLE 6·1 STRATEGIES FOR MANAGING GLOBAL IT • • • • • •
Concentrate on interorganizational linkages Establish global systems development skills Build an infrastructure Take advantage of liberalized telecommunications Strive for uniform data Develop guidelines for shared versus local systems
Roche (1992) presents a number of strategies for managing information tech nology in a global environment. See Table 6-1 . Concentrate on Interorganizational Linkages
The strategy of creating linkages with suppliers and customers can be extremely effective internationally. It can also be very difficult to set up these linkages be cause of differing telecommunications capabilities in different countries. In some regions phone systems do not work well and transmitting data over them is proba bly not viable. Other countries, like France, have an extremely well-developed in frastructure for business communication, which is discussed later in this section. The Internet is one solution for quickly establishing these linkages. Establish Global Systems Development Skills
There are problems managing IT development projects when all participants are from the same country and work in the same location. Coordinating multinational project teams presents an even greater challenge. Language and distance make them difficult to coordinate. A New York bank has a development team with mem bers in New York, Lexington, Massachusetts, and Ireland coordinated through groupware. In some foreign countries, hiring staff with the appropriate skills to work on technology can be difficult. Interviews with IT managers for multination als in seven countries found dramatic differences in their accomplishments and their capabilities. Lack of personnel skills can be a major impediment to develop ing international systems; not all countries have educational programs to prepare individuals for systems analysis or programming jobs. Build an Infrastructure
Justifying expenditures on infrastructure can also be extremely difficult. Infra structure is the part of technology that does not have an immediate benefit. The easiest example is a worldwide communications network. One money-center bank carefully costed out an international, private network and found that it had a negative net present value: The economic criteria suggested not to undertake the development of the network. However, the bank went ahead and found that the new IT provided a number of benefits that were hard to quantify. Basically,
1 35
1 36
PART TWO: ORGANIZATIONAL ISSUES
with this network the bank could "plug in" any application to the network and offer it anyplace in the world it did business. Take Advantage of Liberalized Electronic Communications
The trend toward deregulation in the U.S. is also sweeping foreign countries. France has split France Telecom from the PTT and established it as a quasi-public organization. In the past two decades, France Telecom has replaced an outmoded phone system and added a mass market communications network called the Mini tel system. It is also a leader in providing packet-switched data communications through Transpac. (Packet switching is discussed in Chapter 1 2.) Changes such as these facilitate the development of the international communications networks, which is essential to managing in a global environment. Strive for Uniform Data
One of the major problems in sharing data is identifying it. A story is told that a large computer vendor once looked at its logistics systems and found that "ship
CHAPTER
6:
If you are trying to find products to pur chase for sale or use in manufacturing from around the world, the Web can help. Be fore the I nternet, a pu rchasing manager would comb through industry magazines and catalogs, and travel to endless trade shows. A m e m b e rs-only s e rvice called World Merchandise Exchange (Womex) in N o rw a l k , C o n n ecticut, i s d e s i g n e d for worldwide merchandise trading. The ser vice has a database containing thousands of products from manufacturers around the world. It provides members with free elec tronic mail, online discussions and links to industry publications. A buyer logs onto the
INTERNATIONAL BUSINESS AND I N FORMATION TECHNOLOGY
network, searches the database and finds detailed specifications about a product. These specs include photographs, packag ing data, weights, and pricing estimates. Using e-mail, the buyer conducts negotia tions with potential trading partners. Since it is so economical for a supplier to list its products, the buyer has access to many more sources electronically than he or she did before the W e b . I t is s e rvices l i ke Womex that help level the playing field be twe e n l a r g e , w e l l - f i n a n ce d f i r m s a n d smaller companies, often i n less-developed c o u n t ries, that are tryi n g to e n gage i n global trade.
date" meant six or seven different things depending on the system involved. In one system it might be the promised ship date, and in another the date the item left the loading dock. To obtain economies of scale from sharing data and systems, the firm must have a common vocabulary of terms and definitions. Develop Guidelines for Shared versus Local Systems
We can add another important strategy to Roche's list: You need to develop guidelines for when a system should be shared and when a local, autonomous system is more appropriate. The obvious advantages of shared systems are economies of scale and the ability to share data. The problem with shared sys tems is that they tend to become very large and complex. Also, individual loca tions and users have special needs that must be incorporated into the system. As the number of exceptions increases, the system becomes more cumbersome and difficult to program. The advantage of a local system is that it can often be developed quickly in re sponse to a local condition. If it later becomes necessary to coordinate this system with other applications, special interfaces will have to be created. If each location ends up needing a similar system and cannot share this one, the firm has paid for many systems when possibly one would have sufficed. There are no firm guidelines for making this kind of decision. Firms have had success and failure with both approaches. Systems development in an international environment (or even a domestic one where there are many locations) leads to this problem. Management has to recognize that the problem exists and compare the alternative of local versus global, shared systems.
1 37
1 38
PART TWO: ORGANIZATIONAL ISSUES
THREE EXAMPLES Standard Pharmaceuticals International
Standard Pharmaceuticals International (SPI) is the international division of a multinational drug company headquartered in the United States. The international division consists of 30 foreign subsidiaries located throughout the world. SPI is dependent on the U.S. parent company for all research and new products. A major challenge for pharmaceuticals firms is to obtain government approval for the sale of new drugs. This process can take many years of testing and the sub mission of literally a truckload of documents to the Food and Drug Administration (FDA). The firm then must wait until the FDA approves or disapproves the sale of the drug. Some foreign countries will accept U.S. FDA approval as sufficient to market the drug, but many will not. This practice means that the SPI foreign subsidiary must conduct clinical trials in its own country and submit the results to its govern ment for approval. Once approved, the SPI subsidiary markets the drug to physi cians and hospitals. SPI's information services (SPIIS) department has a "federal" organizational structure. The head of the department reports to the SPI controller (based on his torical precedent; it has been recommended that this individual report to the SPI president). Each country has its own information services manager who reports to the local controller. (In a similar vein, it has been recommended that the local IS manager report to the SPI local subsidiary president.) The headquarters IS group provides advice to the subsidiaries and tries to set standards. However, the local subsidiary staff does not report to the headquarters IS manager. Because of the historical reporting relationship, it is not surprising that most of the applications at SPIIS involve finance, accounting, and sales reporting. The headquarters IS group developed a standard library of applications that most of the smaller subsidiaries adopted. Larger subsidiaries do not necessarily have the same equipment, and several of them have significant IS staffs and portfolios of applications. Recently the parent company appointed a new president of SP!. This individ ual wants to change the strategy of the IS group to emphasize supporting the sales and marketing departments. He has commented, "I have yet to see how one gets a competitive advantage by closing the books each month two days before the competition." SPIIS is trying to adjust to this change in strategic focus. One example of the problems they are encountering is the sales representative notebook computer project. The sales and marketing department launched a separate effort from IS to develop applications for a notebook computer for sales representatives. The portable computer should provide information to the sales representative about his or her territory with access to a commercial database of prescription drug sales. These sales reps visit physicians in their offices and at hospitals to ex plain the company's new products and leave samples for the physician. The sys tem should also keep track of sales calls and keep a record of drug samples left
CHAPTER 6: INTERNATIONAL BUSINESS AND I N FORMATION TECHNOLOGY
with the physician. (This record is often required by governments in order to limit the number of samples distributed.) The marketing and sales groups tried to keep IS from becoming involved in this project because they felt IS was interested only in financial systems. The IS man ager was concerned that the notebook-computer team lacked adequate technologi cal expertise and would waste a large amount of money. Because of country differences, marketing tried different types of systems in different countries. In one country, marketing bought a package system and in vested a reported $ 1 million before canceling the trial. The greatest success has been in France, where the Minitel system made it easy to implement all of the needed functions using existing technology. SPI is caught in the dilemma of a local system versus shared systems develop ment. In addition, the president of the division wants to more than double sales revenues while keeping administrative expenses at current levels. Without provid ing more resources to the IS staff and investing in a worldwide network, it is un likely that the president will be able to accomplish his goals. Asea Brown Boveri
Asea Brown Boveri (ABB) is a Swiss-based electrical company described as one of the most successful transnationals in the world. The company was formed by a merger between Asea, a Swedish engineering firm, and Brown Boveri, a Swiss com petitor. The dynamic chairman at the time, Percy Bamevik, added more than 70 com panies in Europe and the U.S. to this pair of firms. ABB is larger than Westinghouse and is competing directly with GE in the United States. See Figure 6-2. ABB is a transnational firm as depicted in Figure 6-2. The chairman wants local managers to concentrate on their markets, but he also wants to strive for global
FIGURE 6·2
Asea Brown Boveri history from its web site.
1987 • ASEA ofVasteras, Sweden (fonnded 1883) and BBC B....wn Boveli Ltd ofBaden. Switzerlnnd, (fonnded 1891) announce plans to form ABB Asea Brown Boverl Ltd,> hendquart....d in Zurich. Switzerlend. Each parent will hold 50 percent ofthe new company,
1988 � Operations begin January 5, 1988. In the first year, $Orne 15 ""qui.itions are made, nmounling to US$ 544 million. Total employment worldwide at the end Qfthe year is 169}500.
1 39
1 40
PART TWO: ORGANIZATIONAL ISSUES
efficiencies and take advantage of the purchasing power generated by ABB's size. The company is organized as a matrix. Along one axis, the company consists of distributed subsidiaries, each of which makes decisions without regard to national borders or other ABB units. In the second dimension, the firm appears as a group of traditional national companies, each serving its home market. The chairman and a 12-person executive committee provide the glue that holds the two dimensions of the matrix together. Some 50 or so leaders of business areas report to the execu tive committee. The business areas are further grouped into eight segments with a member of the executive committee responsible for each segment. The business leader is re sponsible for optimizing the business globally. Business leaders know no borders, and are located in many different countries. These leaders allocate export markets to factories, share expertise by job rotation, create temporary multinational task forces to solve problems, and devise global strategies. Within each country, there is a traditional structure with a CEO for ABB operations in that country. The CEO reports to a local board of directors, and the business in that country produces its own financial statements. The CEO may have a number of subsidiaries operating in his or her country. There are approximately 1 100 local ABB units around the world (Taylor, 1 991). One significant challenge in this environment is reporting results and finding problems. Shortly after the creation of ABB, the company developed and imple mented a new information system called ABACUS. This system collects monthly performance data from 5000 profit centers in 1300 companies that employ more than 200,000 people in 140 countries. It compares actual performance with budget and forecasts. Local units submit data in their currencies and the system translates all numbers into U.S. dollars for comparison purposes. The chairman looks at vari ables such as new orders, invoicing, margins, and cash flows around the world to spot trends. As an example, he might see that an industry segment is behind budget; looking for more detail, the problem appears to be in one business area. Further study shows that the problems are in one country and that margins are off. The conclusion is that a price war has broken out. The next problem is to decide on a course of action; the system has alerted management to the problem, but they will have to decide on the appropriate course of action to solve it (Simons and Bartlett, 1 992). The company has only two IT staff members and a part-time manager at head quarters. An IS steering committee serves major geographic and business entities. Each of these groups meets several times a year to approve budgets and ensure that technology plans fit the corporate plans. IS managers work for each of three geo graphic regions, five business segments, and 45 business areas. Each business chooses its own application. The company is trying to standardize on Lotus Notes as a corporate groupware environment, and has over 13,000 users (see Chapter 21). VeriFone
Hatim Tyabji, the recently retired chairman of VeriFone, believes in a flexible or ganization structure and in the importance of being close to customers to provide
CHAPTER 6: I NTERNATIONAL BUSINESS AND INFORMATION TECHNOLOGY
a fast response to their needs (Galal et aI., 1 995). VeriFone faced strong competi tors in its early days from AT&T, GTE, Northern Telecom, and Mitsubishi, to name a few. In 1997 Hewlett-Packard acquired VeriFone in order to advance its efforts in electronic commerce; HP plans to keep VeriFone as an independent subsidiary. See Figure 6-3. VeriFone's mission is "to create and lead the transaction automation industry worldwide." In 1 996 the company's products processed an estimated 65-70 per cent of credit card transactions in the world. Much of the business is in custom software that runs in the verification "boxes" and on other parts of the transactions network. VeriFone offers over 1600 programs that run on its verification devices. The firm has also formed alliances to verify and process payments on the Internet, including agreements with Netscape, several banks, and Discover. VeriFone does have an ongoing structure, similar to most organizations. What makes VeriFone unique, however, is the constant "organizing" that occurs within this structure that is accomplished through cross-functional teams. Any employee can form a task force to address a problem. These teams come in and out of existence regularly. They are virtual in the sense that they span different organizations and members may be in different locations. The constant formation, activity, and deacti vation of teams are the mechanism through which VeriFone is constantly organizing. In addition to teams within the firm, VeriFone forms alliances with other orga nizations. A virtual team might span organizational boundaries. Today the com pany has a number of alliances including one with Microsoft to deliver commerce enabled Internet products for retailers and another with Digital Xpress to offer bundled ISDN services to various customers. While organizing is a key activity at VeriFone, there is a conventional organiza tion chart that shows reporting relationships and titles. The organization is relatively
FIGURE 6-3
VeriFone home page.
N)S P;:rYIIJ
Eh'dr....tg .......flh lr1l1tt;1"t'
1 41
1 42
PART TWO: ORGANIZATIONAL ISSUES
flat with the chairman having eight direct reports and the executive vice president six. Tyabji's corporate model is a decentralized network of locations; he refers to this structure as the "blueberry pancake." "All berries are the same size; all locations are created equal" (Galal et aI., 1995). His least favorite location is corporate headquar ters. Regardless of formal structure, an employee can access any other employee di rectly through e-mail. The focus is not on hierarchy and status. Rather, VeriFone defines the "right or ganization structure" as one that locates employees near customers so that they continually put the customer first. The idea is that a customer in a country using VeriFone products can meet with a design engineer located in the customer's country; that design engineer can make changes in the product without approval from anyplace else. VeriFone operates in 53 locations with over 2900 employees. The management culture and norms at VeriFone allow it to operate in an orga nizing mode. Two of the key characteristics of VeriFone that emerged from discus sions with company officials are "fast response" and "a culture of urgency." As one employee described it, there is "never time to rejoice" after finishing a project because there is always something else to do. A lack of organizational hierarchy makes it easier to respond quickly. Because of geographic decentralization and the existence of many virtual teams, an employee is often on his or her own; it is not unusual to be located in Atlanta and to report to a supervisor in Paris. VeriFone counts on individual initia tive to achieve its goals. VeriFone believes, according to its stated corporate phi losophy, that those who perform a job know best how it should be done. It is clear that this culture involves mutual trust. Employees trust the company to support
CHAPTER 6: INTERNATIONAL BUSINESS AND I N FORMATION TECHNOLOGY
their actions and to encourage experimentation. VeriFone trusts its employees to take the initiative and act in the best interest of the company. VeriFone tries to maintain this culture with a minimum of rules. Communications is a key activity at VeriFone. A corporate philosophy of dis tributing power to the lowest level of the organization possible reduces the amount of communications required to operate. At the same time, the global nature of VeriFone's operations creates significant demands for communications, especially for virtual project teams. Managers themselves communicate with e-mail; there are no secretaries to print messages or enter responses. Executives in different countries might work together on the same spreadsheet in preparing a proposal. These executives can access information on bookings, shipments, and revenues from an on-line database with worldwide availability. VeriFone uses 32 different tools for communications. Travel, face-to-face meet ings, and task forces are all communications mechanisms. Frequently task forces work "around the world" with conference calls scheduled so that members take turns getting up at 2 A . M . to participate. VeriFone stresses the need for employees, while a part of a virtual firm, to in teract physically on a regular basis. Large rooms in local offices facilitate group gatherings and the firm has annual meetings of different employees who work in similar functions. Every six to eight weeks, the senior management team gets to gether for a meeting in a different part of the world. (A recent VP of human re sources lived in Dallas; the former CIO and current advisor to the board has homes in Hawaii and Santa Fe, while the retired chairman lives in the San Fran cisco Bay area.) Senior managers feel it is important for employees to know each other so they can use information technology effectively. The cost of face-to-face communications is constant travel; Tyabji reports traveling over 400,000 miles in a year. About one-third of the company's employees are on the road at any one time, leading to an annual expenditure of over $5 million on hotels and airfare (Galal et aI., 1 995). VeriFone suggests that the virtual organization does not necessarily want to substitute electronic for physical interaction completely: rather the electronic and face-to-face (FTF) communications complement each other. At VeriFone, occa sional face-to-face communications enable more regular and routine electronic communications with its advantage of reducing the constraints of time and space on interaction. In addition to communications mechanisms, VeriFone believes in sharing infor mation. The former CIO prepares a daily "flash" report that goes to 300 VeriFone employees daily. The report is a method for evaluating progress. Recipients can easily access the data behind the interpretation so they are not dependent on one person's view of performance. The firm provides so much information that it has registered more than 10 percent of its employees as "insiders" with the Federal Trade Commission. VeriFone also shares information and knowledge with its customers and al liance partners. Before e-mail became easily available through service providers, VeriFone had suppliers and alliance partners on its own e-mail system. Today
1 43
1 44
PART TWO: ORGANIZATIONAL ISSUES
VeriFone provides videoconferencing equipment for these firms. Before going public, when it had to be concerned about releasing information, VeriFone shared its daily "flash" report with some partners. VeriFone uses "appropriate technology," not the newest equipment. It spends about 60 percent as much as comparable electronics firms on information technol ogy. Its e-mail system ran for many years on VAX computers using a text-based mail program. The daily "flash" report is character-based. Current technology ef forts include the development of an Intranet to facilitate information sharing. The responsibility for providing content on the Intranet will be distributed; for exam ple, a new product group will create and maintain pages for its product. For a VeriFone employee, the organizing character of the company, manage ment culture and norms, and information sharing leads to self-governance. The employee may not have extensive physical contact with a supervisor. This em ployee is encouraged to take the initiative in coming up with new ideas for im proving VeriFone, its products, and/or its service to customers. She will communi cate using a variety of media with customers, alliance partners, and other VeriFone employees. She may start a virtual, cross-functional team and be a member of sev eral others. Her major focus will be on quick responsiveness to conditions in her local environment. However, information technology means that she is not confined to local solu tions; VeriFone is able to marshal its global resources to solve local problems. An actual example helps to illustrate this global search. A customer told a sales repre sentative in Greece, based on a VeriFone competitor's statements, that VeriFone lacked a certain product. The sales rep sent a single e-mail to "IS ales," which reached all sales reps worldwide, asking whether VeriFone had a product for this customer. A sales manager in San Francisco took on the task of heading this vir tual task force. He collated 100 replies and constructed a Powerpoint presentation for the sales rep in Greece (while the rep slept). The sales manager had the presen tation translated to Greek, and the sales rep took it to his client the next day. Veri Fone won the account. TRANSNATIONAL VIRTUAL FIRMS AND IT
ABB and VeriFone provide evidence that a transnational firm depends on informa tion technology for information and knowledge sharing, communications, and co ordination. However, technology alone is not enough to create either a transna tional or a virtual corporation. Senior management determines the structure and culture of the firm. At both ABB and VeriFone senior managers shaped and cre ated organizations that encouraged local autonomy and fast response to the envi ronment. Technology facilitates the creation and operation of these companies, just as it can play a crucial role for any organization that wants to become a transnational. The benefits of a virtual organization like VeriFone in international business suggest it as a model for other firms.
CHAPTER 6: I NTERNATIONAL BUSINESS AND I N FORMATION TECHNOLOGY
Less-developed countries, for years on the outside of the computer revolution because of cost and import restrictions, have dis played a ravenous appetite for personal computers. In Brazil where PCs were almost nonexistent a few years ago, computers have become a major part of the culture. It i s est i m ated that tens of t h o u sands of Brazilians are banking at home. PCs can be found in Poland, I ndonesia, Uganda, and Bangladesh. Many of these computers are being used in business, narrowing the competitiveness gap between firms in the less-developed countries and developed nations. Because these organizations do not have old technol ogy, they can start with highly cost-effective PCs and a client-server architecture (see Chapters 8 and 1 3). A bank in Prague with no computer systems moved from paper to a client-server network on Dell computers, al lowing it to connect for the first time with worldwide monetary trading networks. Chile's export-promotion agency connected 1 60 PCs around the world to a g roup of Compaq servers in Santiago so that prospective buy ers could review Chile's export products. In Latin America, Chile is one of the lead ers in applying PC technology. Many small stores use a PC for tracking inventory and
preparing invoices. Larger companies like the winemaker Concha y Toro and the dairy Loncoleche e q u i p their sales force with hand-held terminals or notebook computers. Compania de Petroleos de Chile uses PC based systems to keep track of diesel fuel sales and monitor the growth of trees. The Chilean government is spending $3 million to put computers in schools. Even still Chile has 3.3 PCs per 1 00 people compared to 30 per 1 00 people in the U.S. Brazil has relaxed import tariffs on com puters, and sales have soared. A grocery wholesaler in central Brazil was never able to afford a computer, especially given inter est rates of 1 2 to 1 4 percent per month on capital. Its major competitor used a main frame computer to route trucks. However, the wholesaler sent its trucks on the same routes each day whether there were orders or not. With a $3000 PC and a package from a Maryland firm, the wholesaler has been able to deliver 30 percent more goods with a 35 percent smaller fleet of trucks. It has reduced warehouse employment from 95 to 80 people. The company also installed bar code scanners to track inventory and a central server to track orders. For the first time, it is ahead of its competitors in apply ing technology.
BUSINESS MODELS AND IT MANAGEMENT
Based on their research, Ives and Jarvenpaa (1992) suggest that an international firm goes through the following stages in developing its management of informa tion technology, which are outlined in Table 6-2. Independent Operations
In the 1960s and 1 970s many multinationals gave considerable autonomy to for eign subsidiaries, which acquired hardware and software from local vendors. The applications implemented differed considerably across countries. There was little interaction with headquarters or the IT staff there. Headquarters might have
1 45
1 46
PART TWO: ORGANIZATIONAL ISSUES
TABLE 6·2 INFORMATION TECHNOLOGY APPROACHES IN GLOBALLY COMPETING FIRMS
Approaches IT activities
Independent operations
Headquarters (HQ) driven
Applications development
Total local autonomy
Applications maintenance
Intellectual synergy
Integrated global IT
Modify a working U.S. application for global use
Joint high-level requirements analysis; implementation under local control
Multinational user/IS team designs and oversees implementation of the system
Total local autonomy
Centralized maintenance
Total local autonomy
Centralized maintenance on common core modules; localized maintenance on others
Systems software, hardware
Total local autonomy
Headquarters' decision
Total local autonomy
Common worldwide architecture
Staffing senior IT positions at subsidiaries
Total local autonomy, a local employee
HQ's decision, often a U.S. expatriate
Advice from HQ's IT group, a local employee
Joint decision, a global search for eligible candidates
Control over IT operations
Total local autonomy
Run from centralized data center
Local autonomy, but incentives from HQ
Local systems run locally; common system run from local/regional data center
Relationship between subsidiary and HQ's IT heads
No formal relationship, little or no informal contact
Subsidiaries' IT heads report to HQ's IT head
Dotted-line relationship; considerable informal exchange
IT heads around the world are peers; considerable informal and formal exchange
Diffusion of IT innovation
Little or no diffusion across country boundaries
One-way, from HQ to subsidiaries
Two-way
Two-way "centers of excellence" established around the world
Primary basis for common systems
Consolidated financial reporting requirements
Economies of scale in IT activities
Experience accumulated in other parts of a multinational firm
Global business drivers
imposed a chart of accounts or financial reporting standards on subsidiaries, but these data were rarely transmitted electronically. Headquarters Driven
During the 1980s the focus of multinationals turned to efficiency in information technology operations. Headquarters based in the U.S. sought to implement
CHAPTER 6: INTERNATIONAL BUSINESS AND INFORMATION TECHNOLOGY
TABLE 6-3 BUSINESS AND IT MANAGEMENT APPROACHES
Business model
IT management approach
Multinational Global International Transnational
Independent operations Headquarters driven Intellectual synergy Integrated global IT
worldwide applications at subsidiaries to reduce development and operating costs. The apparent motivation for this approach was efficiency, and local sub sidiaries did not see much to be gained. Intellectual Synergy
This approach to IT returns control to the local subsidiary. Headquarters tries to use influence to guide the choices of the subsidiaries. The firm might host world wide planning conferences. If this model is working, the subsidiaries should re quest advice from headquarters. Headquarters tries to coordinate the subsidiaries to reduce duplicate development efforts and encourage resource sharing. Integrated Global IT
This approach is often adopted because of pressure from global customers. The firm must provide more consistent customer service internationally. Systems de sign requires input from around the world. The firm must standardize its data and will probably consolidate data centers. Headquarters will specify certain applica tions as common systems, such as order entry. There will be limited customization of these systems to fit a subsidiary. Ives and Jarvenpaa suggest that there is a relationship between the com pany's approach to IT management and the business models presented earlier (see Table 6-3).The multinational firm is expected to favor independent opera tions. A great deal of autonomy on information technology decisions is given to the local subsidiary. The focus of the strategy is on local response. The global business model stresses efficiency. We would expect to find a headquarters-driven technology strategy with this approach to business. Head quarters will try to coordinate and centralize to reduce duplication and encour age common systems. An international business model will probably be combined with an IT strategy of intellectual synergy. Subsidiaries depend on headquarters for guidance and for new knowledge. Headquarters tries to influence subsidiary technology policies through planning and sharing information. The transnational firm is most likely to follow an integrated, global IT strategy. Headquarters will define core systems that will provide uniform customer service in a global market. Management of the firm realizes that information technology is an important element in its strategy.
1 47
1 48
PART TWO: ORGANIZATIONAL ISSUES
G For years commentators have described the transportation and communications systems as creating a global village by bringing peo ple around the world closer together. On the commun ications side, two developments contribute to the creation of a global village, the I nternet and satellite communications systems. The map in the accompanying figure shows the worldwide expanse of the I nter net. While access is limited in Africa and the Middle East, there are host servers on every continent except Antarctica! When the Starr report on President Clinton was posted to the Internet, it became instantly accessible
The Internet World.
to over 1 00 million people around the world. This rapid publication is something no news paper or television system could equal. Satellite phone systems also provide the opportunity to reduce the perceived dis tances between people. We discuss these systems further in later chapters. Basically, they provide communications anyplace on the earth via a series of low-orbit satellites. While c u rrently very expensive, as with other technologies, prices can be expected to d rop as more competition develops. Imagine being able to phone home from the middle of the Arabian desert as easily as from London!
CHAPTER 6: INTERNATIONAL BUSINESS AND I N FORMATION TECHNOLOGY
THE INTERNET, IMPERIALISM, AND DEVELOPING COUNTRIES
Earlier in the chapter, we mentioned some of the barriers that countries sometimes put in place that inhibit the free flow of information. The representative of a devel oping Asian country, at a recent conference in Malaysia, stated that the "Informa tion superhighway suggested by Vice President Al Gore was the latest example of American imperialism." During this person's talk, he complained about a number of issues with new technology and the Internet: • His government had to stop censoring newspapers and magazines when fax ma chines became easily available because people called on friends in foreign coun tries to fax the excised material to them. • There was no way to authenticate information on the Internet; some recent civil disturbances were "perpetuated" through unverified information on the Internet. The Army set up a Web site to provide accurate information, but no one accessed it. • It was important for his country and others to participate in the Internet and electronic commerce, but it was also important to find ways to avoid being influ enced by Internet content.
Clearly modem information technology, and particularly the Internet, puts less democratic governments that wish to control and limit information in a difficult situation. The Internet makes it possible for businesses in developing countries to do business with customers around the world, expanding their markets and in creasing trade. However, this same technology makes vast amounts of information available to those with an Internet connection. More than the presence of informa tion, the Internet culture emphasizes the free flow and availability of information. Many developing countries feature strong central governments that exercise con siderable control over the economy. Leaders in these governments tend not to be in favor of providing transparency and full information to the public. How govern ments resolve this dilemma will determine whether they take part in the technol ogy revolution or fall behind the rest of the world. CHAPTER SUMMARY 1. There are at least four international business strategies, including the multina
tional, global, international, and transnational approaches. 2. IT can be used to facilitate international business, especially IT organization design variables that stress communications, knowledge sharing, and coordi nation. Headquarters-subsidiary coordination is one of the most significant challenges in managing an international business. 3. It can be difficult to implement international applications of the technology for a variety of reasons. 4. Many international firms find they need a global network, a technology infra structure that ties together far-flung components of the firm. The Internet, and particularly Intranets, are helping to provide connectivity, information sharing, and coordination worldwide.
1 49
1 50
PART TWO: ORGANIZATIONAL ISSUES
5. Firms building technology must trade off the advantages of local flexibility and freedom against the benefits and efficiency of common systems. 6. IT challenges in an international environment also encompass issues like stan dards, uniform data, and dealing with the different quality and regulation of telecommunications in various countries. 7. Developing countries with strong central governments face a conflict between the need to participate in the growth of technology, especially the Internet, and their desire to control their economies and information. IMPLICATIONS FOR MANAGEMENT
One of the major trends in business is globalization. The IT organization design variables discussed in Chapter 4 are well suited to helping you manage a transna tional firm. You will want a technological infrastructure that features a worldwide network. Building on this infrastructure, you can use groupware, e-mail, confer encing, and other communications technologies to coordinate far-flung operations. Intranets facilitate information and knowledge sharing, and contribute to global coordination. A virtual structure like the one used by VeriFone seems well suited for a transnational corporation. The virtual organization can be designed to pro vide a fast response to local opportunities along with access to the firm's world wide knowledge base. This example demonstrates how organization structure can be a strategic variable, letting you compete via the speed and quality of your re sponse to customers and competitors. KEY WORDS
European Economic Community (EEC) Global International Multinational Transborder data flows Transnational RECOMMENDED READING Bradley, S . ; J. Hausman; and R. Nolan. Globalization, Technology, and Competition: The Fusion of Computers and Telecommunications in the 1990s. Boston: Harvard Business School Press, 1993. (A book of articles by experts in technology, strategy, and interna tional business.) Deans, C.; and J. Jurison. Information Technology in a Global Business Environment. Dan vers, MA: Boyd & Fraser, 1996. (A book of readings and some cases exploring the is sues in managing international IT efforts.) Ives, B.; and S. Jarvenpaa. "Global Information Technology: Some Lessons from Prac tice." International Information Systems. 1 , no. 3 (July 1992), pp. 1-15. (An insightful article that presents several of the models described in this chapter.)
CHAPTER 6: INTERNATIONAL BUSINESS AND IN FORMATION TECHNOLOGY
Roche, E. Managing Information Technology in Multinational Corporations. New York: Macmillan, 1 992. (This book contains a number of interesting case studies of global firms and how they manage IT.) Tan, B . ; K. K. Wei; R. Watson; D. Clapper; and E. McLean. "Computer-Mediated Communication and Majority Influence: Assessing the Impact in an Individualistic and a Collectivist Culture." Management Science, 44, No. 9 (September 1 998), pp. 1 263-1278. (This research study found that the impact of computer-assisted com munications in an experiment was influenced by the culture in the country of the experiment, showing that cultural factors have an important impact on the use of technology. )
DISCUSSION QUESTIONS 1. What has
motivated the current interest in global business? regulate the data collected within its borders? 3. One study reported that managers found concerns about regulations on transborder data flows to be unwarranted. Why do you suppose this issue has not surfaced? 4. What are the advantages of providing a subsidiary with a great deal of local autonomy? 5. What are the disadvantages of local autonomy for subsidiaries? 6. How should a manager determine whether a system should be "common" across a number of subsidiaries, or uniquely developed for each subsidiary? 7. Why do you suppose Standard Pharmaceuticals International primarily developed fi nancial and accounting systems? 8. What can the president of SPI do to change the division' s strategy toward marketing and sales support? 9. How can information technology support a marketing-oriented strategy in the drug industry? 10. What are the key features of VeriFone' s structure? 11. What are the risks of a global IT strategy? What are its benefits? 12. What impediments do you see to worldwide networks for coordinating the activities of global firms? What is the role of the Internet in this process? 13. How can an international firm see that local staff members have enough expertise to develop and apply IT? 14. What are the problems of establishing common data elements in a global organization? 15. Why does a firm need common data elements and structures? 16. How can IT help coordinate a global firm? Where can it help save money while making the firm more responsive? 17. Roche (1992) advocated a number of interorganizational linkages in conducting inter national business. What problems do you see in connecting a global firm to its many customers in different countries? 18. What kind of business activities do you think are most amenable to common systems in different countries? 19. What are the advantages of making product design information available around the world? How might you use this capability to organize product development? 20. If company management or custom dictates a fairly independent and autonomous IT ef fort in subsidiaries, what approaches can management take to coordinate these activities? 21. What Internet access policies would you recommend to the government of a developing country? 2. Why might a country want to
1 51
1 52
PART TWO: ORGANIZATIONAL ISSUES
CHAPTER 6 PROJECT
I m p l i cations of NAFTA The United States, Canada, and Mexico are working to eliminate trade barriers among these three trading partners. Some South American countries envision a completely free trade zone in the Americas. Using recent articles in the business press, develop a list of the positions, pro and con, taken by various interest groups, such as business, labor, and politicians, on free trade in the Western hemisphere. What impact does the Mexican peso crisis of 1995 have on your arguments? What about the plunge in Asian currencies in 1 997? If tariffs are drastically reduced or eliminated, what is the role of information technology in encouraging more trade? In managing firms in the hemisphere?
1 54
PART THREE
I
I
T his
part contains important material you will need to make decisions
about technology, as shown in the accompanying figure. To make decisions intelligently, the decision maker must understand some of the technical is sues involved. A basic knowledge of technology is needed to manage infor mation systems activities effectively. In Chapters 7 and 8, we discuss computer hardware. Users and managers are often involved in the selection of the appropriate technology for an ap plication. Should the application run on a large or midsized computer, or on PCs connected on a local area network? The user may be involved in the selection of the entire computer system. Possibilities here range from a personal computer to a large general-purpose computer system. It is also very likely that the acquisition of specific devices, such as laser printers, networks, optical storage units, and similar equipment will involve the manager. Finally, management must decide where computers will be located and what applications each computer will execute. There are also many important decisions concerning computer software, a topic discussed in Chapter 9; for example, should a user buy a particular program for a personal computer? Many organizations have developed comprehensive databases in order to run basic transactions processing applications. More recently organizations
1 55
1 56
PART THREE: INFORMATION TECHNOLOGY
have compiled large amounts of data into "data warehouses" in order to gather information useful for providing better customer service and for mar keting products and services. Database technology is the topic of Chapter 1 0. The subject of communications is of great interest to management. Deregulation by the government, combined with the entry of new carriers, creates many choices for communicating both voice and data. How should computers be configured? What kind of network is desired? What are the opportunities to communicate directly with the computers of suppliers and customers? Chapter 1 1 introduces communications technology while Chapter 1 2 discusses the world of networks. Private and industry networks have existed for many years. The mass market networks like America On line are a more recent phenomenon. Of course, the most famous network of all is the Internet, and we shall explore its potential for business. Today's manager is faced with a variety of IT architectures. Chapter l 3 describes and provides examples o f systems that range from large central ized computers to the more modern client-server architecture. A manager is always concerned with the various sources available for products and services. In the technology field, there are many suppliers available for both hardware and software. We discuss some of the possibili ties and their advantages and disadvantages in Chapter 1 4 . Hundreds of new software products are announced each month for personal computers. Here the problem is not deciding on the source but having enough informa tion to decide which package to buy for a specific application. The purpose of the material in this part is not to educate technologists. Rather, the objective is for you to gain enough understanding of the tech nology to make intelligent decisions about it.
CHAPTER 7
Outline The Components of a Personal Computer
Primary Memory or RAM The Arithmetic Basis of Computers How Memory Is Organized Memory Technology The Central Processing Unit Doing Arithmetic How Does the CPU Work? An Instruction Set CISC versus RlSC What Makes a Chip Perform?
What Techniques Increase Speed? Input and Output Input-Only Devices Output Devices Reducing a Bottleneck
Focus on Change
The computer is the device that started it all. The machine described in this chap ter has been combined with communications technology, among others, to make dramatic changes in the way organizations are structured and operate. At first 1 57
1 58
PART THREE: I NFORMATION TECHNOLOGY
people viewed computers as large fast computational devices. An executive said to a class in the 1970s that he saw no reason to be interested in a machine that simply printed thousands of pieces of paper an hour. Over the last 20 years, the combination of computers, communications, and databases has increased the ca pabilities of the technology exponentially; one can do a lot more than just print! Incredible changes in technology have stimulated new approaches to the structure of organizations and markets. In the next two chapters we examine the technol ogy that is responsible for these new business models . •
Why should one be interested in the way computer equipment works? You may al ready own a computer and find that you do not need to understand much about com puters to use it. On the other hand, it is quite likely that you will be involved in pur chasing computers, either for yourself or for other people. The numbers involved are hard to imagine! There are well over 150 million personal computers in the world. Today's marketplace is a confusing one. There are a variety of computer ven dors with different capabilities and prices. What is the bus, and how does it influ ence the speed of a computer? What are RAM and ROM? Does it matter if one computer has a higher clock speed than another? To make intelligent purchasing decisions, you must understand how computers work, and particularly how certain features influence their performance. In this chapter, we discuss the basics of com puters. In the next chapter, we trace their evolution to provide background on how the industry reached its present state. People invented computers and their associated equipment, and one of the most difficult aspects of computers is a consequence of this human design. Of the engi neering and design decisions made during computer development, many appear arbitrary. Computer design is unlike a field such as mathematics, in which theo rems are developed and proved rigorously. The reasons for a certain design feature may not be obvious even to a computer expert. Designers make decisions by bal ancing performance estimates of how the computer will be used against costs. Be cause of the arbitrary nature of design decisions, we discuss general concepts that underlie the operation of most computer systems, although specific machines dif fer from any general discussion. The equipment we discuss in this chapter and the next is often referred to as computer hardware-the parts of the computer that can be touched physically. Chapter 9 is about computer software-the instructions in the form of programs that command the hardware to perform tasks. Physically, programs are entered in the computer through a keyboard. However, once inside the computer, a program cannot be seen and is represented electronically in computer memory. THE COMPONENTS OF A PERSONAL COMPUTER
The computer you are most likely to encounter first is a personal computer. Gener ally, these computers feature a keyboard for entering data, a CRT or television like output device for displaying data, and some form of storage. A typical, simple schematic for such a computer is shown in Figure 7-1 . In this section, we present
CHAPTER 7: THE FUNDAMENTALS
FIGURE 7·1
Schematic of a personal computer.
an overview of the parts of the computer; in subsequent sections, we discuss the components in more detail. The heart of the computer is the central processing unit or CPU, which contains the logic that controls the calculations done by the computer. In most personal com· puters, the central processing unit is connected to a bus. The bus is a communica tions device, really a connection among various parts of the computer. The bus car ries ( 1 ) instructions from programs telling the computer what to do and (2) data. On modem computers, there is a separate bus between the CPU and random access memory (RAM), or what is often called primary memory. A separate, high-speed
1 59
1 60
PART THREE: I NFORMATION TECHNOLOGY
bus is needed here because contemporary CPU and memory chips are so fast that the main bus, into which the keyboard and secondary-storage devices are plugged, is too slow for the CPU and memory. Primary memory of the computer holds two kinds of information. The first is data, as one might expect. For example, if we want to add two numbers together, such as 178 and 256, these numbers are stored in computer memory. Once added, their sum, 434, would also be placed in memory. Instructions in the form of software programs are also stored in primary mem ory. The instructions or software tell the CPU what to do. Instructions provide the logic of the computer and enable it to perform calculations and manipulate data. One main feature of memory is its passive nature: memory is only a storage place for information. The CPU executes instructions using registers that are a part of the CPU; it moves data back and forth to memory when it performs a calculation. Another way to look at memory is to consider that primary memory has no logic capability. It is a repository for data and instructions. The diskette drive or disk is another form of storage. This secondary storage is usually larger than primary memory and is less costly. In Chapter 10, we discuss secondary storage in much greater detail. Note, however, the disk controller in Figure 7- 1 . There is logic required to connect or interface the disk to the computer, and the controller provides this logic. Although the CPU contains the most logic in the computer, we can see there are other functions in which a component must display some logic, such as the disk controller. Similarly, there is a keyboard processor to interface the keyboard with the computer, and a video driver to control the CRT. Finally, we have an input output (110) processor, which is dedicated to controlling devices such as printers. The last component in Figure 7-1 is called read-only memory (ROM). Read only memory stores instructions used by the computer, and they are, in essence, contained in hardware. Your personal computer has something called a ROM BIOS, which contains the basic input-output system of the computer and loads when you turn the computer on. These, then, are the components of a typical personal computer. What the user sees is the keyboard, a systems unit, the monitor or CRT, and the printer. All the other components, as well as the diskette, CD-ROM, and disk drives, are inside the systems box. Primary Memory or RAM Although the central processing unit controls the computer, we need to discuss primary wi'mory before examining the CPU to demonstrate how the computer stores data and instructions. In the next section, we see how the CPU processes the stored program and data to produce results. The Arithmetic Basis of Computers A computer can perform computations through an electronic counterpart to the arithmetic operations we perform on a routine basis. However, computer systems
CHAPTER 7: THE FUNDAMENTALS
at their most fundamental level use a different number base from the common base 10 with which we are familiar. The number 46 in base 1 0 can be represented as 4 x 10 + 6 x 1 . Furthermore, 1 0 is equal to 101, and 1 is equal to 100 (anything raised to the 0 power is 1 , by definition) . In our system of arithmetic, the position of a digit represents the power to which the base is raised before multiplication by the digit. For the number 46 above, 6 is in the 0 position and 4 is in the 1 's position. We can rep resent 46, then, as 6 x 1 0° + 4 X 101. This same procedure could be continued for more digits. For example, the number 346 can be represented as 6 x 1 0° + 4 X 101 + 3 X 102. Now there is a 3 in the 102 position that adds 3 x 102, or 300, to the number. There is no reason to use the base 10 for arithmetic. It is convenient for human beings, but not for computers. A computer can be designed most easily to function in base 2, or the binary system. The two digits of the binary system (0 and 1 ) can be represented as "on" and "off," for example, through the presence or absence of an electrical voltage.
1 61
1 62
PART THREE: I NFORMATION TECHNOLOGY
A binary number is represented in the same positional notation as a base 1 0 number. The number 101 1 10 in binary, starting with the rightmost digit and work ing left, would be converted to base 10 as follows : 0 x 2°
0 x 1
0
1 X 21
1 x 2
2
1 X 22
1 x 4
1 X 23
1 x 8
=
0 X 24
0 x 16
=
1 X 25
1 x 32
4
8 0
32 46
which adds to 4 6 in base 10. At the most basic level, computers store and process data in binary form, but this is not an easy system for humans to understand. Therefore, the binary digits in computer memory are grouped together to form other number bases for perform ing operations. IBM mainframe computers group four digits to create a hexadeci mal, or base 16, machine. Fortunately, even programmers rarely work at the binary level. For many applications, software or design of the hardware makes the ma chine appear to perform base 10 arithmetic from a programming standpoint. All types of symbols can be coded and represented as binary numbers. For ex ample, we could develop the following table to encode four alphabetic letters using two binary digits: A
=
00 B
=
01 C
=
10 D
=
11
Thus, a series o f binary digits can b e coded to represent characters with which we are more familiar. How Memory Is Organized Now that we have a convenient way to represent numbers and symbols, we need a way to store them in memory. Different computer designers have adopted dif ferent schemes for memory organization. Generally, all computers combine groups of bits (binary digits) to form characters, sometimes called bytes. The number of bits determines the size of the character set. From the example above, we can code 2n distinct characters with a binary number of n digits. For example, if there are 4 bits, there can be 24, or 16, symbols for data. Many modern comput ers use an 8-bit character, or byte, giving a possible character set of 28, or 256, symbols. The computer can display symbols such as uppercase and lowercase let ters, numerals, punctuation marks, and so on. After a character set is developed, the next design issue is to decide how to or ganize the memory of the machine. One basic use of memory is to store and fetch data, so we need a way to reference storage. An everyday example will help to clarify the problem. Suppose we are expecting an important piece of mail. The de livery will be made to the mailbox at our street address. We know that by looking in the mailbox at our address, we shall find the mail if it is there.
CHAPTER 7: THE FUNDAMENTALS
Now consider computer memory to be a group of mailboxes. We need an ad dress to define each piece of data stored in memory so it may be placed in a partic ular location (mailbox) and retrieved from that location. It is possible to have an address for each character in memory, or sometimes groups of characters are com bined to form words and the words are given an address. In some computer archi tectures, four 8-bit bytes are combined to form a word, though each byte also has an address. A word structure is convenient because many numbers will fit within a single word, as do many types of instructions. Instructions, as well as data, must be stored in memory, and deciding on the in struction format is another design problem. At a minimum, the instruction must contain an operation code that specifies which operation is to be performed, such as add or subtract. The operation code is combined with one or more addresses. Suppose a computer has 8-bit bytes and that four bytes make up a word. Each byte can store either an alphabetic character or two numbers. An instruction on this computer might look like: Byte Contents
1
2
3
4
A
D
34
56
The computer could be designed to interpret this instruction as: Add the con tents of storage location 3456 to the contents of a special part of the computer called an arithmetic register. (It is unlikely that the computer would treat bytes 3 and 4 the way we have above. It would most probably treat bytes 3 and 4 as a 1 6bit binary number to identify a storage location.) A single-address machine is designed with instructions that have one operation code and one address, as in the example above. For most instructions, the single address specifies the memory location for one piece of data to be operated on by the instruction. In the case of an add instruction, the address specifies the memory location whose content is to be added to some data already contained in the central processing unit. Memory Technology How does a computer actually store data? Remember, all we need is to distinguish between two states to represent a 0 or a 1 . From these binary numbers, we can build an alphabet of symbols and numbers using other number bases. Today's computers all use semiconductor technology for primary or random access mem ory (RAM). A typical memory cell consists of electronic elements, including the transistor and capacitor. The designer of the computer would represent a 1 in memory by the presence of a voltage on the capacitor and a 0 by the absence of such a voltage. An important characteristic of RAM is the fact that it is volatile. When power is turned off, the contents of RAM memory are lost. How does the computer access a particular memory location? Figure 7-2 is a diagram of primary memory. Note that there are address lines running in both directions through the array of memory cells. By turning on the address line in row 4 on the left and column 5 on the bottom, we select the shaded cell in the
1 63
1 64
PART THREE: I N FORMATION TECHNOLOGY
FIGURE 7·2
Semiconductor memory.
figure. A transistor in the cell acts as a switch to connect a storage capacitor to its address line. Using this approach, the computer can access any bit in primary memory. The Central Processing Unit As stated earlier, the CPU controls the operation of the computer because it con tains most of the logic circuitry for the machine. Program instructions are stored in memory along with data. In a basic computer system, the instructions are stored sequentially beginning at some location in memory. By convention, the CPU al ways fetches the next instruction in sequence and executes it unless the program instructs it to do otherwise.
CHAPTER 7 : THE FUNDAMENTALS
Doing Arithmetic Computers can process several types of numbers. A fixed-point number is an inte ger; its decimal point is fixed and is assumed to be to the right of the rightmost digit. Examples of fixed-point numbers are 25 1 2 and 67 1 . A floating-point number corresponds to scientific exponential notation. The po sition of the decimal point is indicated by digits associated with the number. For example, we might have a floating-point format of . 1 632E03, meaning that the number 0. 1 632 is to be multiplied by 1 000. The number in conventional form, then, is 1 63.2. The number 1 6.32 would be presented by . 1 632E02. The exponent allows the decimal point to "float." It is also possible to have registers that perform decimal arithmetic. Are arithmetic registers really necessary? One early computer without registers performed mathematical operations by looking up information in tables in mem ory ! The presence of arithmetic registers, however, speeds computations. If regis ters are not used, a program requiring memory and execution time must be written to simulate desired arithmetic operations. Some early computers had only fixed point addition and subtraction capabilities. Multiplication was accomplished by successive additions, and division by successive subtractions. In a similar manner, programs simulate floating-point operations on many personal computers. Most contemporary computers feature fixed- and floating-point registers for addition, subtraction, multiplication, and division. Most PCs today have chips with built-in floating-point hardware. The alternative is to use a floating-point coprocessor chip, or floating-point arithmetic must be simulated using a program. How Does the CPU Work? The central processing unit or CPU on most computers is found on a single chip. Figure 7-3 is a simplified diagram of an advanced CPU chip that contains the fol lowing components: The control unit manages the CPU, initiating instruction fetch and execute cycles. The bus interfaces the cache memory on the chip with random access memory chips (RAM). Note that there is a 64-bit-wide bus to move data back and forth between the CPU and memory. The address bus is 32 bits wide, and it transmits the addresses between RAM and the CPU to fetch instructions and to fetch and store data. The code cache is a portion of very fast memory on the CPU chip. The chip copies a series of program instructions here from RAM so that the CPU can reach them faster than it could if they were only on memory chips. (See below.) The data cache is also fast memory for keeping small amounts of data for faster access than is available from RAM memory chips. The instruction location counter always points to the next instruction in a pro gram to be executed.
1 65
1 66
PART THREE: I N FORMATION TECHNOLOGY
FIGURE 7·3
Simplified model of an advanced CPU.
The instruction decoder determines what each instruction means; for example, it analyzes the ADD instruction and indicates to the control unit that an add op eration needs to take place and which registers are required. Many instructions in the computer reference a location in memory. For exam ple, the ADD instruction might say ADD X, where X is a piece of data in RAM. The address generator computes the address in memory for these data. (Note that the code and data caches also have the ability to work with ad dresses. They have to determine if requested data are in the cache or must be fetched from memory.) The integer unit performs integer arithmetic, and the floating-point unit per forms floating-point arithmetic. The arithmetic and logic unit (ALU) per forms logical operations such as comparisons between two numbers.
CHAPTER 7: THE FUNDAMENTALS
The CPU typically executes an instruction in two phases. The first is the fetch phase. Its objective is to fetch an instruction, pointed to by the instruction location counter, and move it to the instruction decoder for processing. During the execute phase, the control unit manages the execution of the instruction; for example, the instruction might say to take data from a certain location in memory and add it to a number already in the integer unit. A clock on the chip determines the speed of operation. For example, a chip with a clock speed of 500 MHz has a clock that produces 500 million cycles per second. Some instructions can be performed in a single clock cycle, but many require several cycles. Floating-point operations usu ally require the most clock cycles due to their complexity.
Caching When reading product reviews of computers, you may see descriptions of different types of memory caches. The operation of moving data and instruc tions to and from RAM takes time (several clock cycles). Memory is available that can move data in a single clock cycle, but this faster memory costs much more than regular RAM. Designers build small caches or "holding areas" using this high-speed memory to hold the data and instructions currently used by the CPU. This strategy works because most programs need only a small number of actual memory locations at any one time so the cache will usually have the required data or instruction. When the CPU needs data or instructions not in the cache, addi tional delays are encountered while the slower RAM is accessed. CPU designers are responsible for caches within the CPU, which are called L 1 caches. Figure 7-3 shows two of these Ll (on the CPU) caches. Computer manufacturers frequently add additional caches, called L2 caches, that may or may not be on the CPU chip. These are much larger and a little slower than the L l cache but much faster than RAM. All other things being equal, if you buy a computer with a larger L2 cache, it will be faster than one without this feature. An Instruction Set What operations can be performed by a typical computer? Table 7- 1 contains an outline of instructions for a processor, the CPU chip from Intel which is in "IBM compatible" PCs. Note the different classes of instructions in the table, including data movement, arithmetic, logical comparison, and branching. Large computers have repertoires of well over a hundred instructions, along with ten or more regis ters capable of performing arithmetic operations or serving as temporary locations for data. else VERSUS Rise The CPU is implemented in electronic circuits. Some instructions are imple mented in a single, complex circuit capable of completing the entire calculation in a single clock cycle. Other instructions are implemented on several more general-purpose circuits under the control of microprograms that are stored in read-only memory in the CPU itself. These microprograms, which chip designers create, are not something a programmer ever sees. They are used to implement
1 67
1 68
PART THREE: INFORMATION TECHNOLOGY
TABLE 7·1 EXAMPLES OF CLASSES OF INSTRUCTIONS FOR THE INTEL CPU, THE CHIP USED IN PCs
Instruction
Meaning Data Transfer
MOV = Move
To move data between memory and registers
XCNG = Exchange
Exchange a register or memory with a register or a register with the accumulator
IN = Input from
Input from a fixed or variable port
OUT = Output
Output to a fixed or variable port Arithmetic
ADD = Add
Add contents of register or memory to accumulator
ADC = Add with carry
Add contents of register or memory to accumulator with carry
SUB = Subtract
Subtract contents of register or memory with accumulator
SBB = Subtract with borrow
Subtract contents of register or memory with accumulator
CMP = Compare
Compare registers and/or memory Logic
NOT = Not
Invert
AND = And
Register/memory logical and with register/memory
OR = Or
Register/memory logical or with register/memory
XOR = Exclusive Or
Register/memory logical exclusive or with register/memory Control
CALL = Call
Call a routine
JMP = Jump
Jump to a new location to begin execution without conditions
NET = Return
Come back to code from a call
J** = Jump on
**Become a series of letters indicating conditions like jump on less or equal, jump on equal, etc.
complex instructions and work by substituting a series of small or "micro" execu tion steps on several general-purpose circuits for an enormously large and com plex circuit that would be required to do all the work in a single step. A CISC (complex instruction set computer) processor is one that uses many such complex instructions. For example, one common CISC instruction specifies adding two numbers together in memory. Since memory cannot actually do that, the instruction is implemented by a microprogram that moves the data from the memory to registers, adds the values together, and then stores the sum back in memory. Implementing that many steps in a single electronic circuit requires an
CHAPTER 7: THE FUNDAMENTALS
extraordinarily large and complex circuit; it is expensive to build and takes a very long time to design and test. Using a microprogram simplifies the design of com plex instructions . The many general-purpose circuits the microcode uses are easy to design and can be built very inexpensively. However, developing and testing the microcode that implements a complex instruction does take a lot of time. RISe (reduced instruction set computer) processors are designed with sin gle, simple instructions, such as adding the contents of one register to another. RISC processors contain a large number of identical registers (typically between 64 and 256) that are used for storing intermediate results for immediate use. The objective of the RISC chip designer is to have all instructions execute in a single clock cycle. Compared to CISC, RISC processors are simpler and they execute in dividual instructions much faster. However, to accomplish the same task, a RISC CPU often must execute more instructions than a CISC CPU. The RISC CPU is likely to be faster and cheaper to build than a CISC CPU, but the two machines might accomplish the same task in the same length of time. Because the RISC processor is simpler, it takes less time to design and requires fewer circuits to im plement than a CISC processor. The main disadvantage of RISC architectures is that the language compiler (see Chapter 9) has to be more sophisticated than the CISC language processor. The debate between advocates of RISC and CISC may not be all that important because it appears that modem chips have components of each type of architec ture. For example, one manufacturer is believed to use a RISC architecture to actu ally implement a CISC CPU in order to be compatible with previous computers. The two architectures may merge in the future so CPU chips will have elements of CISC and RISC designs. WHAT MAKES A CHIP PERFORM? What factors are responsible for the incredible performance of CPU chips? Table 7-2 contains data on the design characteristics of the popular Intel chip that powers IBM-compatible PCs. The performance characteristics of the PC processor chips form the rows of Table 7-2.
• Clock speed. The clock sets the speed of machine cycles. If all else is held con stant, increasing the clock speed of a chip will increase its performance.
• Data path. The data path or size of the bus refers to how much data are moved between memory and the CPU with each instruction. If all else is constant, hav ing a larger data path speeds the machine because fewer trips to memory are needed to process data. • Computation. If the chip can do computations on more bits at a time, instruction execution will be faster because the instruction will have to be executed fewer times. • Memory size. More memory often lets large programs execute more quickly. It is particularly important when using graphical user interfaces, or when more than one program is loaded at a time.
1 69
1 70
PART THREE: INFORMATION TECHNOLOGY
TABLE 7-2
CHARACTERISTICS OF PC PROCESSOR CHIPS Performance characteristics
of 8088 series
XT
286
chips
PC
PC
Clock speed,
4.77
Data path, bits Computation
AT
Pentium
II
386
486
Pentium
Pro
Pentium
6-12
1 6-33
1 6-50
66-200
1 20-200
233-450
500+
8
16
32 1 6 (SX)
32
64
64
64
64
16
16
32
32
32
32
32
32
640 K
2M
4- 16 M
4-64 M
4-64 M
1 6-64 M
64-128 M
1 28+ M
Coprocessor
Coprocessor
Coprocessor
On chip
On chip
On chip
On chip
On chip
3.3 mil
5.2 mil
7.5 mil
9.5 mil
Pentium
III
MHz
size, bits Typical memory size, bytes Floating point
except for SX Number of
29,000
1 30,000
275,000
1 .2 mil
transistors per chip
• Floating-point arithmetic. If the chip has built-in floating-point arithmetic,
• • • •
many numerical calculations will be faster because they can be performed in hardware rather than software. MIPS (million instructions per second). This figure is an indication of the raw speed of the chip. Number of transistors per chip. The more densely packed the transistors, gener ally, the faster the chip. Parallel processing. The Intel Pentium II and III chips have three instruction registers so they can decode three instructions per clock cycle. Pipelined execution. A pipeline is a bit like a factory assembly line; instructions move through a series of steps as they are fetched and executed. Instructions start down the pipeline one after another so that more than one instruction is in the process of being executed by the pipeline at once.
Table 7-2 shows that the first IBM PC was a very slow machine by today's standards ! (Few predicted the dramatic success of personal computers, nor did we forecast the huge increases in processing power and reductions in cost.) The 286 chip or AT (for advanced technology) had a significant impact on performance. Clock speed increased and the data path between memory and the CPU doubled in size. The current generation of chips, the Pentium, is extremely powerful, with a speed of more than 1 00 times that of the AT. These machines fetch 64 bits of data at a time and perform computations on 32 bits at a time.
CHAPTER 7: THE FUNDAMENTALS
a There are many applications in which chips are embedded in a product. For example, your microwave oven probably has an Appli cations Specific Integrated Chip (ASIC). Eu rope and Asia have taken to another appli cation of an embedded chip: the "smart card." The technology, first developed in the 1 970s, involves putting a chip in a credit card. Today's chips are much more powerful so the card can be more versatile. U .S. West is marketing its Telecard in Seattle. The chip in the card is loaded with digital cash for use in pay phones in the city, and the company wants to extend the card to retailers. The idea of the card is to eliminate cash, something that will take a long time, if ever, to accomplish. Business Week estimated that people spend over $1 .8 trillion a year on purchases of under $ 1 0, with $560 billion of
that in the U.S. Merchants lose 5-7 percent of cash receipts to the cost of handling that money. Cash cards help speed checkout lines since a transaction takes only one or two seconds compared to making change at a cash register. The issuer of the smart card can keep the float, the money you pay for the card, until it is spent, unlike the credit card where the issuer provides you with float. They also get the "slippage," the cash that is never spent on the card. A number of companies are looking into offering smart cards. Mondex is testing a sys tem in the U.K., while Visa launched a card at the 1 996 U.S. Olympics where 5000 termi nals in Atlanta accepted the card. The smart card readers cost from $50 to $800 and the cards themselves run $1 0, much more than the familiar credit card.
Intel has created a family of products around the Pentium chip. The Celeron chip is a low-price, lower-performance Pentium processor designed for machines in the $ 1 000 price range; it is a Pentium running at a lower speed, with no cache memory on the processor chip in its first versions. (Subsequent versions incorpo rate an L2 cache on the processor chip itself.) The Pentium III processor has 70 new integrated instructions for 3-D processing. The Pentium Xeon is available for servers. What Techniques Increase Speed? Although the characteristics above will help you select a computer, they are not enough because the manufacturers have come up with some techniques to make PCs faster. The first option is a cache memory-a high-speed memory that speeds up the slower memory that we first saw in Figure 7-3. Consider a disk drive where it takes 10 milliseconds on the average to access data. Instead of moving that data directly into main memory, it is placed in a cache memory. When the computer reads from the disk, the cache memory is filled with the data requested and with extra data nearby. (Often disk accesses occur close to each other.) If the next read is for mate rial in the cache, it can be transferred to primary memory at memory speeds rather than at disk access speeds . .of course, if there is no "hit" on the cache, it means the desired data are not there and the computer must get them from the disk.
1 71
1 72
PART THREE: I N FORMATION TECHNOLOGY
A cache can be used almost anyplace to speed up a computer. Many PCs use a cache with primary memory. A 64-Mbyte memory might come with a cache of 5 12 kbyte. You can also use a cache or separate memory with the video controller to improve video speeds. As described above, a pipelined computer breaks down instructions into many small steps like an assembly line. Each of these steps or stages is handled by a separate circuit. When an instruction finishes one stage, it goes on to the next one, and the stage it just left begins work on the next instruction. Also mentioned earlier, the Pentium chip features two integer execution units, each fed by its own instruction pipeline, also called superscalar architecture. This architecture allows the Pentium chip to execute two instructions per clock cycle. Programs that translate higher-level user languages into machine language (discussed in the next chapter) have to be modified to figure out which user pro gram instructions can be split to operate in parallel. It is not likely that the chip will be able to execute two streams of instructions all the time, as some operations must be done in sequence. Many of today ' s PC applications feature graphics, so manufacturers have turned their attention to the video controller and its role in the computer. Machines feature local bus video, a connection from the CPU to the video controller, that runs at a speed more like the bus between memory and the CPU than the bus used for peripherals such as printers or modems. Graphics accelerator cards are video controllers that actually have a processor chip and a large amount of memory (say, a megabyte or more) to offload the display task from the CPU. Finally, you can purchase a computer with a wider and faster bus that con nects the CPU to peripherals. In the first PCs all components used the same bus-video, memory, printers, and so on. As we discussed above, 32-bit CPUs have their own data path of 32 bits (in general) to memory. Computers generally come with a bus to peripherals, such as printers and disks, that carries more data than the standard 1 6-bit ISA (Industry Standard Architecture) bus. Today you will find three bus types, the Extended Industry Standard Architecture (EISA) bus, the PCI or Peripheral Component Interconnect, and the Universal Serial Bus, USB . The USB allows up to 1 27 components to be connected to a PC; it is "plug and play," meaning that the bus recognizes the component and the user does not have to set switches on printed circuit cards for it to work. It handles data at the rate of 1 2 Mbytes per second and is suitable for low- to medium speed peripherals, for example, a digital camera. All these factors can have a dramatic effect on the performance of a pc. It is not always the case that a computer with a higher clock speed is faster than one with a slower clock speed because there are many features that affect overall speed. Input and Output Computers process data in times measured in billionths of a second. Compared with these internal speeds, getting data in and out of a computer is very slow. Table 7-3 lists some of the most common input-output devices.
CHAPTER 7: THE FUNDAMENTALS
TABLE 7-3
POPULAR INPUT-OUTPUT DEVICES
Both input and output
Input devices
Output devices
PC Terminal
Keyboard Mouse Scanning Image Optical Character Recognition Bar code Touch screen Voice
Printers Laser Inkjet Voice Graphics
Input-Only Devices
Terminals and PCs Most users interact with a computer through a keyboard to provide input to their system, whether it is a mainframe or a Pc. Some of the interaction with mainframes or midrange systems is done through a "dumb" ter minal, a terminal that is able to send and receive data from a computer. More often, personal computers replace terminals. In a client-server environment, the user interacts directly with a server using the full capabilities of his or her local workstation. Bar Coding Bar coding is an extremely popular way of entering data into a computer. We encounter a form of bar coding in grocery stores equipped with checkout scanners. These devices use a laser to read the universal product code (UPC) stamped on grocery items. A laser device reads the bar code and software translates it into a product identifier. A computer looks up the price of the item and indicates the charge on a display. Similar types of readers are used in other kinds of stores to mark items. The advantage of such an input device is that a retailer can automatically keep track of inventory and sales. Other types of bar codes are used extensively in the manufacturing industry. In a highly automated factory, parts are marked with bar codes. The codes direct the flow of the part through the factory and may even indicate to a machine what op erations to perform on it. The use of bar coding can dramatically reduce the need for individuals who follow orders through the factory and keep track of where work in process is located, a form of indirect labor. Scanners Imaging Image scanning is used for desktop publishing systems based on per sonal computers. A user can scan photographs, drawings, and other items and place them on a page. The computer makes no attempt to understand what is being scanned. It simply transfers an image from one medium to another. An imaging device or scanner uses a laser to digitize an image. This image consists of thousands of dots, say 300 dots per inch (dpi). Each dot is assigned to a
1 73
1 74
PART THREE: I NFORMATION TECHNOLOGY
memory location along with associated information. For example, if the scanner is capable of representing shades of gray or color, information about intensity or color of the dot is also stored. You cannot input an image containing characters di rectly into a word processing package or modify the scanned document. You need OCR software to do this.
OCR Optical character recognition (OCR) is an important input technique. Today OCR and image scanning are both sometimes referred to as "scanning." Technically speaking, the scanner is a piece of hardware that makes a digital image of a page. It is the same hardware that digitizes images. Once the image is created, an OCR software package, and there are several available, reads the image and converts the characters in the image to ASCII. The results can then be saved as a word processing document and changes made to it. The performance of OCR software is highest on printed material and marginal, at best, on handwritten material. To recognize letters or characters, the OCR soft ware compares the input with a series of stored characters attempting to find the best match. This task is far easier for printed characters that follow some stan dards. Handwriting defies description in many cases ! There are opportunities for great labor and cost savings if OCR software can get to the point of recognizing handwriting. Consider the impact on the post office if machines could read 75 per cent of the handwritten zip codes on letters. OCR input saves typing data. One can take information that is not in machine readable form and avoid retyping it. As one might suspect, storing the recognized letters requires far less storage than storing an image. For example, the Associa tion for Computing Machinery (ACM) has an extensive digital library available on the Internet; the Association is scanning back issues of its journals because it is the most cost-effective way of capturing this older printed material. Pen A number of pen-top personal computers are available on the market. The user works with a pen to print characters or check boxes on a form. These devices
CHAPTER 7: THE FUNDAMENTALS
In an effort to serve its customers better, Charles Schwab, a brokerage firm, has in stalled a system called Voice Broker. The system responds to customer phone calls, answering requests for information. Schwab handles more than 1 5,000 equities, but the system has to be able to handle 1 00,000 dif ferent information requests because cus tomers ask q u estions u s i n g d iffe rent phrases. For example, you might ask for a quote on IBM or I nternational Business Ma chines. Regional dialects and accents also complicate the task. The benefits for the customer are obvi ous; there is no need to go through multiple touch tone menus to get information. For a firm with heavy peak demands, like a broker age house, it would not be feasible to have enough human staff members available to answer the phone. This situation is particu larly true for Schwab when there is a major movement in the securities markets. Schwab formed a Voice Tech nology Group consisti n g of 20 staff m e m bers. They pilot tested the system, and it was so successful that the firm quickly developed a production system. This version of the system recognized voices with 95 percent accuracy and provides results in less than 2 seco n d s . The appl ication at Schwab does require a lot of maintenance because
the database changes so often, with merg ers, new companies being listed on the ex changes, and companies that adopt a new stock symbol. Manufacturers of voice recognition sys tems say that companies using them can save 90 percent of the costs of every call. These costs are made up of salaries and benefits for humans who respond to callers, a group that has 50 or 60 percent turnover in most firms. A voice equipment manufacturer estimates that a person can only handle about 28,000 calls a year, many fewer than a voice response system. More advanced systems are under test ing. For example, imagine calling an airline, stating departure and arrival cities and the date of travel, and getting a response from the reservations system. As this technology becomes more widespread, there will be an impact on the jobs of employees answering customer questions. The phone companies have worked to reduce the number of infor mation operators through various forms of automation, including voice response for long-distance calls. From 1 970 to 1 996 the number of jobs for telephone operators fell from 400,000 to 1 64,000, with a fifth of the jobs being lost in the last six years since AT&T started using voice recognition for long distance calls.
are intended for individuals who do not like to type and for applications where portability is needed. To date they have been successful for service people like de livery persons who need to keep records. Pen-top computing has not been applied extensively to managerial applications.
Voice Voice input is changing the way we work with computers. Speech recog nition and synthesis (turning a text into speech) technology have progressed re markably. A $99 program allows you to use speech input to control the Windows desktop and to dictate documents. Original recognition systems could not handle continuous speech; the user had to pause between words. Currently available sys tems recognize continuous speech with acceptable accuracy, 90 to 95 percent after training the system with your voice and pronunciation.
1 75
1 76
PART THREE: INFORMATION TECH NOLOGY
There are a number of current speech applications, but they are mostly for workers whose hands are not free to type while they perform some task like sort ing packages. There is limited professional use of speech input, but this situation is likely to change as users gain experience with this software. Several companies are working on devices to allow Internet access through special telephones; the In ternet services will have to use speech recognition software that does not have to be trained for each user. These companies envision an environment in which you could dial an air travel Web site and ask about flights between cities; the system would display the result on your phone or with voice output. There has been much progress in the last few years, and it is likely that speech will compete with the keyboard for input during the next decade.
Touch Screens This technology provides a great alternative to keyboard entry when the users' choices are somewhat confined. By putting his or her finger on the screen, the user indicates a choice. A bank can use touch screens for its ATMs. A factory has touch screens for an operator to set up tests on a quality-control ma chine. The American Stock Exchange uses a touch screen for entering certain kinds of quotations, and many restaurant order-taking systems use touch screens. This type of input is appropriate when a small amount of information is to be en tered, particularly when it is desirable to eliminate a keyboard. Mouse PC users often work with an input device called a mouse. It directs a cursor around the screen and sends commands to programs when you press the mouse buttons . The mouse, or some pointing device, is necessary for machines featuring graphical user interfaces (GUIs) and icons. Placing the cursor on an icon and pressing a button on the mouse selects the item, that is, generates a command signified by the icon. This type of interface, called "direct manipulation," is a stan dard for personal computers. Output Devices
Laser Printers The most convenient output device for a personal computer is the laser printer. These devices generally print with a resolution of 300 to 600 dpi or higher and produce high-quality output. The laser printing process is similar to photocopy technology. It offers various sizes and types of print, produces high quality output, and is very fast compared with alternative techniques for obtaining hard copy output. Minis and mainframes also can use laser printers. These higher speed devices print 30 to 40 pages per minute. Much of the output from transac tions processing computers is done on laser printers. Inkjet Printers Inkjet printers squirt charged droplets of ink onto paper. They are used extensively with personal computers and have a modest cost advantage over laser printers for monochrome output. Inkjets are the clear choice for low cost, high-quality color printing.
CHAPTER 7: THE FUNDAMENTALS
Voice Voice output has been available for a number of years. Banks sometimes provide on-line inquiry about account balances. For example, keying in one's ac count number produces an audio response of the account balance. Voice output is used extensively for telephone information. The information operator indicates which number displayed on a terminal is the correct one, and a computer gener ates a voice response. The operator is free to answer another call while the first message is playing. Reducing a Bottleneck There are a variety of input-output techniques for computers. Despite the variety, however, moving information to and from a computer is slow. Most information is typed into computers, yet the world is populated by typists and nontypists. Alter native forms of interfaces such as voice, direct manipulation, and touch screen offer ways to encourage the use of computers. One major trend is to reduce the amount of human effort involved in input. Bar coding and the electronic exchange of information both serve to eliminate input labor. CHAPTER SUMMARY 1. It is important to understand the basic components of a computer and how they work when making decisions about technology. 2. The heart of a computer is the central processing unit or CPU, which contains the logic of the computer. 3. Memory is another critical part of the computer. The CPU addresses specific cells in memory using the location's address. 4. A bus that carries data is used to connect the various components of a com puter. Modern computers may have several buses to handle the different speeds of computer components. 5. The CPU has registers for performing operations, for example, doing arith metic computations. 6. Computers calculate using the binary number system because it is easy to rep resent a 0 and 1 (the binary digits) as "off' and "on." Programs convert binary to the more familiar base 1 0. 7. The instruction set of a computer comprises all the instructions that the CPU can execute. Generally these instructions encompass moving data, performing arithmetic, logical operations, and control of a program. S. The historical trend has been for computer chips to become more powerful, contain more components, feature more advanced logic, and cost less. This dramatic increase in power as costs decline is responsible for the proliferation of computers, which in turn encourages more and more applications of infor mation technology. 9. The slowest parts of the computer deal with input and output. For this reason we try to capture data at its source and reduce the amount of data entry and output whenever possible.
1 77
1 78
PART THREE: INFORMATION TECHNOLOGY
IMPLICATIONS FOR MANAGEMENT The question of how much a manager should know about technology is an emo tionally charged one. There are managers who feel they do not need to have any knowledge of technology; they can leave these issues to staff members. On the other hand, IT is so pervasive in the modem organization, and so many firms de pend on it for critical applications, that a manager needs to be able to make edu cated decisions about technology. This need suggests that you should have a mo dicum of knowledge about technology, but how much is that? During your career you are likely to be involved in decisions about what hardware and software to purchase, the hardware and software architecture of the firm, and numerous appli cations of technology that involve employees, customers, suppliers, and others. Given the demands these decisions will make, it would be difficult for you to know "too much" about technology. One of the objectives of this text is to provide you with a strong base of knowledge about technology. I hope you will be moti vated to continue learning about the technology throughout your career.
KEY WORDS Address generator Arithmetic-logic unit (ALU) Base Binary Bus Cache Cache memory Capacitor CD-ROM Code cache Complex instruction set computer (CISC) Control unit CPU CRT Data cache Disk Diskette Execute phase Fetch phase Floating point Hardware Imaging Input/output (I/O) Instruction decoder Instruction location counter Integer unit
CHAPTER 7: THE FUNDAMENTALS
Laser printer Local bus Microprogram Mouse Optical character recognition (OCR) Pipelined Primary memory Random access memory (RAM) Read only memory (ROM) Reduced instruction set computer (RISC) Register Scanner Secondary storage Superscalar architecture Voice input Voice output RECOMMENDED READING Bucki, L. PCs 6-in-i. New York: Macmillan, 1997. (An excellent handbook providing an overview of computer hardware devices and architecture.) Gookin, D. PCs for Dummies, 6th ed.. Foster City, CA: IDG Books Worldwide, 1998. (A good introductory tutorial explaining basic operations of computer components, system configurations, upgrades, and troubleshooting.) Holliday, B. CPU Complete Educational Package. Beverly Hills, CA: Fun Books, 1997. (A very helpful book for learning the basic operations of a CPU.) Norton, P.; and J. Goodman. Peter Norton 's inside the Pc. 7th ed .. New York: Macmillan, 1997. (This very popular book sold over a million copies (in all editions) and provides detailed descriptions on working principles and operations of computers.) Pabst, T. Tom 's Hardware Guide: High Performance PC Secrets. New York: Macmillan, 1998. (A comprehensive reference for computer hardware.) Roman, S. Understanding Personal Computer Hardware. New York: Springer-Verlag, 1998. (A handbook with a thorough yet concise description of the entire PC, including its subsystems, components, and peripherals.)
DISCUSSION QUESTIONS 1. What is
the role of the CPU in a computer? is the function of primary memory in the computer? How does it interact with the CPU? 3. Why do you think memory chips are easier to build than CPU chips? 4. Why is the binary system suitable for computers? 5. What two major items are stored in primary memory? How can you distinguish be tween them? 6. What is the advantage of having floating-point arithmetic registers? 7. Why would a designer try to make one computer execute the programs of another computer? 2. What
1 79
1 80
PART THREE: I NFORMATION TECHNOLOGY
8.
What is the role of the different components of the CPU shown in Figure 7-3?
9. What is the difference between ROM and RAM? 10. How do you store and retrieve data in memory? 11. What is
a bus? is there a need for a disk controller in Figure 7-1 ? 13. What are the key factors to consider in purchasing a personal computer? 14. What is the difference between the fetch phase and the execute phase in executing an instruction? 15. Why does a computer need a lot of instructions? 16. Why are there two caches on the CPU chip in Figure 7-3? 17. Explain how a CPU executes an instruction. 18. What changes in technology do you think are responsible for making personal comput ers possible? 19. What are the minimum features for a home computer? How about for a personal com puter to be used in an office? 20. What kind of programs do you think are likely to make the most use of floating-point instructions? 21. What are the differences between secondary storage and primary memory? 22. What is the role of microprogramming in a CISC CPU? 23. What are the major differences between CISC and RISC architectures? 24. What is the difference between hardware and software? Where do the lines blur? 25. What are the advantages of using hardware for processing as opposed to software? Where is software advantageous? (Hint: Think of speed and then think of ease of mak ing changes to a process.) 26. What are the advantages of scanning as an input medium? 27. Why is there such a mismatch between input-output and internal computer speeds? How can this mismatch be reduced? 12. Why
CHAPTER 7 PROJECT
Simon Marsh a l l Associates Simon Marshall, the company introduced in the project in the first chapter, is in terested in the possibility of using a computer to provide services to clients. John Marshall's brother, Scott, just finished getting an MBA with a specialization in in formation systems . When John saw Scott during his summer vacation, he told him about his problems with computers. Scott advised, "Start with a personal computer and see where things go from there. The power of these machines is phenomenal. Let me give you a suggested configuration, both for hardware and software. You may need a little help with the programs so why not go to a local college and hire a student part-time to help you learn how to use it? Nothing could be much cheaper." Scott recommended that Simon Marshall take the plunge and order one of the fastest pes available. He recommended using Windows 98 and its Office software, explaining, "The software that runs under Windows offers so much that it is worth
CHAPTER 7: THE FUNDAMENTALS
learning how to use it." Scott started John with a spreadsheet processor, database management system, and word processor. Scott explained his recommendations to John: "The 500-MHz machine is a re ally fast computer. It should serve you for a number of years without requiring much of an upgrade. I've chosen very basic software. After you've begun to use it, I'll be happy to recommend other packages when you need them. This should be enough to get started with." What is your reaction to Scott's recommendation? What criteria should Simon Marshall use to evaluate personal computers if the company decides to acquire one? Why would Scott recommend choosing one of the newest and most expen sive personal computers?
1 81
CHAPTER 8
I
Outline Implications for Managers The Computers of Today
The Rise of the Mainframe Powerful Supercomputers Minis: The Beginning of the Revolution The Personal Computer Has Changed Everything The Server The Network PC versus the Under $ 1 000 PC Massively Parallel Computers A Personal Assistant Conclusions Why So Many Types of Computers?
Focus on Change It has taken many years to reach the point where computers and communications can transform firms and industries. Firms that undergo a transformation know how to manage a diverse set of computers and other devices. They are successful in responding to trends in technology and to the ongoing changes in the cost/performance ratios of different types of computers. Users and managers confront a technology that has changed dramatically since the 1 950s. We have moved from clerks preparing input on punched cards to managers using powerful 1 82
CHAPTER 8: A PROLIFERATION OF COMPUTERS
desktop workstations connected to local- and wide-area networks of servers, minicomputers, and mainframes. As the technology has changed, it has opened up new possibilities for managers and the organization. IMPLICATIONS FOR MANAGERS This chapter and Chapter 7 contain a great deal of material about computer tech nology. What are the implications of this technology for management?
• The cost/performance ratio for computers continues to decline as the price con tinually drops for increased levels of computing.
• Logical functions are no longer the most expensive part of the computer. In the first generation, the CPU was the scarce and expensive resource. Today very large scale integration (VLSI) using current technology can put millions of transistors onto a small silicon chip. Processing logic is now readily available at a relatively small cost. • Organizations are spending increasing amounts of money on computers be cause they are indispensable for many applications. Even though unit costs may go down, the total expenditure for information technology is increasing in most organizations. • The ease of use and the appeal of a networked personal computer allow many more individuals access to computer technology. To compete in the coming years, a manager will have to be an intelligent computer user. It is very difficult to define an appropriate hardware and software architecture for a firm, given the large number of competing demands and alternatives avail able. Rapid decreases in the cost of making very powerful chips means that work stations have better cost/performance characteristics than mainframes. We discuss architecture further in Chapter 1 3 .
• Companies have a wide variety of computers because it would be very expen sive to replace old computers and applications all at once.
• In addition to computers themselves, today' s focus is on networks using telecommunications to link computers . It is no longer sufficient to consider computers alone since almost any computer will be a node on a network. • A basic understanding of hardware and how it works will help you select and use the appropriate computer equipment. Managers today are faced with a vari ety of computers of different capabilities. A manager may be forced to use exist ing hardware because it is already in place or may have the option of acquiring new equipment. In either case, it is important to understand the capabilities of the different types of available computers. THE COMPUTERS OF TODAY How have we achieved our current wealth of computers? In the early days, the types of computers were limited. All computers were known as mainframes (which
1 83
1 84
PART THREE: INFORMATION TECHNOLOGY
are described later in this chapter). At one time, eight different companies in the United States manufactured computers. Univac had the early lead in computing, but soon lost it to IBM. (Later Univac became a part of Sperry, which merged with an other computer vendor, Burroughs, to form the UNISYS Corporation.) As IBM became the dominant vendor in the United States and abroad, the com puter industry was sometimes described as "IBM and the Seven Dwarfs." In the 1 950s and early 1 960s, companies such as Apple, Digital Equipment Corporation (DEC), and Compaq did not exist. RCA and General Electric manufactured main frame computers, eventually taking huge write-offs as they left the business. Today minicomputer and mainframe vendors are reeling from dramatic changes in the cost/performance ratios of "commodity" processor chips versus systems based on proprietary circuit designs. What trends in the technology have created today's computer industry? Why are there so many different types of computers, and what is each one designed to do? The Rise of the Mainframe Figure 8-1 presents an overview of the current computer environment. The first computers developed were mainframes, which are large general-purpose machines. In the early days of the computer industry, one could run only batch programs (the staff collects all data into a batch that is processed at one time) on mainframe com puters. Many organizations have developed substantial applications on mainframe computers. Today this type of machine is likely to support a number of terminals and personal computers interacting with huge databases containing billions of char acters of data. Mainframe computers are used extensively to process transactions and maintain vital data for access by various users. Examples of mainframe sys tems include order entry and processing at an electronics manufacturer, production planning and scheduling at Chrysler, and airline reservations at all the major air carriers. (We discuss the future of mainframes more in Chapter 1 3 .) Historically, IBM has dominated the mainframe market but experienced prob lems as users have shifted to other kinds of architectures . The challenge for today's mainframe manufacturers is to adopt new technology that will make these machines competitive on cost/performance measures. For example, one crude measure of performance is millions of instructions per second (MIPS) that a com puter can execute. PCs and workstations cost less per MIP than mainframes. Mainframe computers feature proprietary hardware (instruction sets that in general are unique to and controlled by the vendor). Intel and Motorola make mil lions of chips a year; the demand for mainframe computers is far less. The propri etary architectures of mainframe computers cannot take advantage of economies of scale in production, and this is why they have a worse cost/performance ratio than smaller computers built around commodity chips. Mainframe vendors are working to reduce the costs of their machines, for example, by designing multi processors using chips like the PowerPC. Today many mainframe applications are called "legacy systems." These systems represent a heavy investment; they process critical transactions, and they are diffi cult to change. These mainframe systems are capable of processing a huge volume
CHAPTER 8: A PROLI FERATION OF COMPUTERS
FIGURE 8·1
A guide to computers.
1 85
1 86
PART THREE: I NFORMATION TECHNOLOGY
of transactions given very high speed data channels (defined below). It is difficult to configure smaller systems to handle 1 500 or 2000 on-line transactions per second, something that a mainframe order entry system does routinely. Even though the firm might be able to buy hardware that has a better cost/performance ratio, it would have to spend a huge amount to develop new applications for this hardware. IBM's strategy is to continue mainframe development and to keep these ma chines competitive. It updates the operating system regularly; the most recent edi tion features networking capabilities to help the mainframe become a giant server on a network, capable of hosting large electronic commerce applications. Over the past five years, mainframes have become smaller, faster, and cheaper as a re sult of using CMOS technology and the clustering of parallel processors to pro vide more computing power. IBM's S390 sixth generation (G6) processor runs at over 1500 million instructions per second (MIPS) . This computer can have up to 1 2 processors, each operating at over 200 MIPS. Organizations using mainframe computers generally process large amounts of data. The computers may access databases with billions of characters of data and control networks of hundreds or thousands of terminals. As a result, the computers need to be able to handle extensive telecommunications activities and input-output operations. The mainframe usually has a data channel, which is as powerful as the CPU on some smaller computers. The data channel accepts instructions from the CPU, for
CHAPTER 8: A PROLIFERATION OF COMPUTERS
it The Department of Energy sponsors much of the research on .supercomputers through its Accelerated Strategic Computing I n i tiative. The objective of the p rog ram is to t r i p l e computing p e rformance every 1 8 months for a 1 0-year period . These powerful computers will be used to run weapons simulations as a part of compli ance with the Comprehensive Weapons Test Ban Treaty. The laboratories involved estimate they will need 1 00 teraflops ma chines by 2005 due to the increasing com plexity of the simulations. I B M has deliv ered part of a system that will perform at 3 teraflops, with a 2.5 terabyte memory, to
the Lawrence Livermore National Labora tory. IBM is building its computing using off-the-shelf RS6000 chips. The design of these machines faces hardware and software challenges. Very fast processors can be slowed by the time re quired to transfer data from memory to the processor. Programmers also have to be able to develop extremely complex simula tions without having a lot of tools available for supercomputers. However, the implica tions are clear. Computers will continue to become faster, and many of the advances at the supercomputer level eventually filter down to the desktop.
example, to retrieve data from a disk file. The CPU goes on to another job while the data channel is busy. When the data channel finishes, it interrupts the CPU to let it know that data are available. The CPU then restarts the program that was in terrupted if its priority is higher than other programs that are waiting to run. Con trol units on the mainframe serve to interface the computer, in this case the data channel, with different 110 and storage devices. This architecture has created mainframe computers that are extremely fast, and that can be used in database, transactions processing, and numerous other applications. Powerful Supercomputers Mainframe computers are not fast enough for some applications. The mainframe computer was originally developed for business use. It has features to enhance the processing of business data involving character manipulation and decimal arith metic. Scientists and engineers have computationally intensive problems to solve, often involving numbers with many digits of significance. Examples include the simulation of airflow over an aircraft, weather forecasting simulations, analysis of geological data, and even predictions about the speed of a sailboat designed for the Americas Cup competition. Companies such as Cray Research manufacture supercomputers; Cray domi nates the market with over 200 of the top 500 computers installed. Supercomput ers are among the fastest computers today, with speeds measured in hundreds of megaflops (a megaflop is the execution of 1 million floating-point instructions per second) to more than a gigaflop ( 1 billion floating-point instructions per second). Machines have achieved teraflop speeds, executing over 1 trillion instructions per
1 87
1 88
PART THREE: I N FORMATION TECHNOLOGY
second! Some experts argue that the future of high-speed computing is in mas sively parallel machines (described below) or by combining the power of a num ber of individual workstations connected with a network. Of the 20 fastest com puters in the world, only one uses "vector technology," the original approach to supercomputing. The second fastest machine is a prototype massively parallel su percomputer built by Intel for Sandia National Laboratory in New Mexico. The computer is based on 9 1 52 Intel Pentium P6 processors and has achieved a peak speed of over 1 .3 trillion mathematical operations a second. As of this writing, the fastest supercomputer is "Pacific Blue" at Lawrence Livermore Laboratory in Cal ifornia. This computer, with 5800 processors and built by IBM, is capable of a peak performance of 3.88 teraflops. Minis: The Beginning of the Revolution The next type of computer to be developed was the mini. Companies such as DEC, now a part of Compaq, found that with integrated circuits they could build a highly cost-effective small computer with an 8- or 1 6-bit word length. Minis became very popular as stand-alone time-sharing computers and as machines dedicated to a department in a corporation. Minicomputers evolved as manufacturers increased processing speeds and ex panded word sizes to 32 bits. These computers can be classified as "midrange." IBM claims to have sold more than 200,000 of its midrange AS/400 systems. Companies use this midrange computer for a variety of processing tasks, some of which are similar to what a mainframe did a decade ago. A firm might use this computer for all its processing needs. A geographically dispersed company could have AS/400 computers at various geographic locations connected to a larger ma chine at headquarters. Third parties have developed thousands of applications for the AS/400 as well. As an example of the trends in medium and larger computers, in 1 995 IBM in troduced models of the AS/400 built around its PowerPC chip. IBM, Apple, and Motorola developed this RISC chip to compete with Intel. Using a customized ver sion of this chip lets IBM get away from a proprietary architecture and reduce the cost of the computer. However, because there are a huge number of applications for this popular computer, IBM had to maintain compatibility with its original architec ture. The computer translates existing applications software the first time it is exe cuted on the new machine without the need to change the original program. The Personal Computer Has Changed Everything Next came the PC or personal computer, which was first designed as an 8-bit com puter. Apple introduced its famous PC in 1 977. The original IBM PC, marketed in 1 9 8 1 , fetched 8 bits at a time from memory but performed computations on 1 6 bits at a time. Soon IBM introduced the AT, which fetches and processes 16 bits at a time. The next generation is the 32-bit PC or 386 (later the 486 as well) computer, which fetches and processes 32 bits at a time. The newest chip, the Pentium III, is capable of fetching and storing 64 bits at a time. The personal computer is used in thousands of ways today, and there are many thousands of programs available for it.
CHAPTER 8: A PROLIFERATION OF COMPUTERS
Figure 8-1 shows personal computers and workstations as separate categories. Workstations use high-performance 32-bit computers for engineering and scien tific work. The workstation features superior graphics and is often used for design tasks. Powerful Pentium personal computers running graphical user interfaces (GUls) fall into the workstation class as well. These PCs have the computational power and software capabilities to become the same kind of personal productivity tool for the manager that the engineering workstation is for the engineer. The Server In the client-server model of computing, a user's client PC makes requests of a server computer that has data and possibly programs on it. The server is responsi ble for the database and is likely to execute transactions to update and manage it. The server also has to extract data and provide it to the client. The user's client does various analyses of the data using its own processing power. At first, the server did not do much but let users download software and print reports in a local area network. However, as PC chips became more powerful, so have servers. They now challenge minicomputers and may soon go after the mainframe market. Intel is so optimistic about the server market that it is marketing complete boards for servers containing four Pentium chips. A vendor can use this board as the major component of a server. Vendors like Sun Microsystems sell powerful servers based on their own chips like Sun's SPARC chip. IBM is even calling its mainframes "enterprise servers." A large grocery store used to have a $250,000 minicomputer. Now it runs its business on a multiprocessor server that costs $25,000 to $50,000. One Compaq server containing four Pentium processors has been clocked at 600 transactions per second with standard database software compared to 200 transactions per second for some midrange computers. Server makers envision computers with up to 32 Intel Pentium processors achieving the performance of today's high-end mainframes. The Network
PC
versus the Under $1000 PC
Competitors of Microsoft, along with the Internet, stimulated the development of a new kind of PC called the Network PC. The idea behind the Net PC is that a per son connected to the Internet does not need a powerful PC; this individual can work quite happily with a device that has a relatively slow CPU, limited memory, and perhaps no disk drive. Advocates of this approach think it should be possible to build the Net PC for well under $ 1 000. Competitors to Microsoft envision the Net PC running some other operating system (control program) than Windows 98 or Windows NT, both Microsoft products. The Net PC has so far failed to displace sales of full-featured personal comput ers. These devices do look attractive as replacements for dumb terminals (termi nals with minimal logic that connect to minis and mainframes) or for providing network access for students at a more affordable price than a standard PC for most school districts. The dramatic reductions in the price of full-featured PCs bring their costs closer to those of a Net PC, making the case for the latter less clear.
1 89
1 90
PART THREE: INFORMATION TECHNOLOGY
It should be noted, however, that the cost of owning a PC goes well beyond its purchase price. The "total cost of ownership" for a PC in an organization has been estimated at two or three times the purchase price, primarily due to software and support requirements and the costs of networking PCs together. The Net PC, be cause it is simpler and takes most of its software from a server, should have a lower total cost of ownership than a full-featured PC. The majority of PC sales today are for a class of machines costing less than $ 1 000. It is not clear whether the Net PC will be attractive if one can buy a full featured PC at these prices. How sensitive are consumers to a few hundred dollars if it buys a much more capable computer that can do meaningful work when not connected to the Internet? Massively Parallel Computers The highly parallel machine category in Figure 8-1 represents a number of ap proaches to computer design. The approaches have in common the idea of trying to avoid the bottleneck in conventional designs where all instructions and data have to be fetched from memory and brought to the CPU for processing. Some of these parallel computers have multiple processors that all execute the same in struction at once on the same data. Others execute multiple instructions on differ ent data. Clearly, coordinating the execution of instructions and programming these machines are a challenge. IBM has created a parallel supercomputer based on RISC technology in its very successful RS6000 workstation, which uses the PowerPC chip. The RISC-based SP1 connects as many as 64 chips and can run almost all the software that cur rently runs on its workstations. A number of experts in the field expect parallel computers to replace mainframes . As the physical limits of computation are reached, one way to gain increased performance is to compute in parallel. A recent strategy followed by some users who need extremely high-speed com puting is to connect clusters of high-end workstations with special software that lets them attack the same problem. The software assigns various parts of a com plex computation to several workstations, generating considerable increases in processing power. It is possible for some applications that used to require a super computer to run on such a connected group of workstations. A Personal Assistant The PDA or personal digital assistant began as super calculators able to store a user's calendar and phone book. Today these devices often weigh less than a pound and some offer handwriting and voice recognition, fax and modem commu nications, and even a pager. PDAs are inexpensive enough that firms will develop dedicated applications for them. For example, a sales representative might use a small PDA that has information on contracts. A longshoreman uses a PDA that has a bar-code reader and scanner to record the location of containers. A rental-car company might have local maps and tour guides available in each city to be down loaded to your PDA. As wireless transmission technology expands and drops in price, PDAs will become more attractive.
CHAPTER 8: A PROLIFERATION OF COMPUTERS
In Orange County, California, real estate agents now have the opportunity to use a PDA to remotely access, download, and store property information on a Sony Magic Link personal communicator. An agent can use it to communicate via fax, electronic mail and paging, or access a commercial on-line service. The agent can select list ings using different parameters such as location and special needs of the client. The PDA will replace printed property listings, which were published every two weeks. There are a variety of PDAs available with the market leader being the Palm Pilot from 3Com. There is even a cellular phone that accesses e-mail and provides some of the features of a digital assistant. PDAs' competitors are hand-held com puters that feature small keyboards to facilitate data entry, a process that is clumsy at best on a PDA. The smaller PDAs use proprietary operating systems. Microsoft promotes Windows CE for slightly larger PDAs that are more computer-like than the hand-held models. Microsoft's long-term goal is to capture this market as well as the set-top cable controller market for Windows CEo
Conclusions We can see why the task of developing the architecture for an organization's com puting system is so difficult. If an organization is starting with no computing, one could conceive of buying a large midrange computer, a small mainframe, or a net work of personal computers. The question of which option to choose may require a major study and considerable effort. The organization that already has a number of computers in place must decide how to manage and expand its systems as users develop new needs and ideas for technology.
1 91
1 92
PART THREE: INFORMATION TECHNOLOGY
Why So Many Types of Computers? The text discusses several different types of computers, but you may be quite happy with a desktop or notebook PC. Why are there so many different kinds of machines, supercomputers, mainframes, minis, and PCs? This chapter discussed different computers in order of their development. In Chapter 13 we shall see that the most popular architecture today is called a client-server configuration. Why have companies not adopted this configuration and replaced their older configurations? The major reason for the variety of computers is the applications users have programmed to run on them. There are many applications developed for main frame computers. It would be very expensive to convert to a new architecture, given that the new system could handle the processing volume of the mainframe. As the industry develops new types of computers, mainframes, minis, and PCs, users will write custom applications for them. One large financial services firm recently reported having over 75,000 active COBOL programs comprising some 70 million lines of code, a significant investment in one language and system. As a result, there is a great reluctance to throw away existing applications to adopt the latest trend in computing. Instead, companies put new applications on the lat est computing platform, create new interfaces for their old mainframe systems, and plan to reprogram applications sometime in the future. You should not be sur prised to see a variety of almost all types of computers discussed in this chapter in a company, nor should you think a firm is necessarily behind the times because it still has applications that run on mainframe computers. CHAPTER SUMMARY 1. Computer technology is marked by great changes. The early years were the era of the mainframe. They were followed by the development of the mini computer and then the personal computer. 2. The mainframe computer is often criticized today, but it has a lot of features to recommend it. The most important is the large number of applications that currently run only on mainframes. The cost of redoing all of these systems is staggering! Mainframe technology is also well understood, and the machines have achieved a high degree of reliability. However, mainframes feature pro prietary architectures that are very costly and tend to be associated with in flexible applications. 3. The minicomputer has evolved into a "midrange" system. These systems are blurring with file servers that provide data and sometimes programs for PCs in a network. 4. A few manufacturers make supercomputers. It appears that the supercomputer of the future is most likely to be a massively parallel machine or a group of computers on a network all working on the same problem. 5. The personal digital assistant is in its early phases. Improvements in wireless communications and the capabilities of these machines should increase their appeal.
CHAPTER 8: A PROLIFERATION OF COMPUTERS
6. The revolution in computer technology came about because of the chip and the ability to put millions of electronic components on a small chip of silicon or other material. An Intel Pentium II CPU on a chip has over seven million components and can execute well over a 1 00 million instructions a second, which is comparable to the speed of many mainframe computers. 7. Many of the features of larger computers are being incorporated into PC chips as these devices become more sophisticated. 8. Changes in the technology force changes in hardware and software architecture. The cost per MIP of a PC is much lower than for a mainframe. PC software is also easier to use and more appealing to the user than mainframe applications. These changes in the technology and the economics of computing have led to the client-server model in which data and some programs reside on servers, midrange computers, and/or mainframes while users work with PCs running programs to access and analyze the data provided by the various servers. 9. Computers are very fast, but secondary storage is not. It takes much longer to access data on a disk than in primary memory. However, it is not practical (or possible) to keep gigabyte (billions of bytes) or larger databases in primary memory.
IMPLICATIONS FOR MANAGEMENT While starting your own business is risky and has a lot of challenges, at least you are not likely to be stuck with a 20-year-old hardware and software architecture. The reason you want to understand something about the variety of computers available is that you may encounter them. In fact, you may have to help develop an architecture for your employer, figuring out where you want to be and how to get there given the existing stock of equipment. While you might like to get rid of a particular computer, it is important to remember that there may be some applica tions that will only run on it. Airline reservations systems will use mainframe computers for processing for some time in the future. It is also unlikely that you have the resources or patience to throw away all your old applications and develop them again for a different kind of computer. You may save money on hardware, but at a tremendous cost in labor for systems development. KEY WORDS Batch Data channel Disk file Graphics Minicomputer MIPS Proprietary hardware Server Very large scale integration (VLSI)
1 93
1 94
PART THREE: I N FORMATION TECHNOLOGY
RECOMMENDED READING Barnes, L.; Shimberg, D.; and L. Lingner. Client/Server and Beyond: Strategies for the 21st Century. Englewood Cliffs, NJ: Prentice Hall, 1997. (An essential text for under standing client/server systems.) Hord, M. Understanding Parallel Supercomputing. Los Alamitos, CA: IEEE Computer Society Press, 1998. (A book illustrating the evolution, concept, and basic architecture of parallel super computing technologies.) 1EEE Spectrum, January issues. (This publication features annual technology reviews and forecasts for a number of technologies. Monthly issues generally have some articles on computer hardware and software and networks.) Shurkin, J. Engines of the Mind : The Evolution of the Computer from Mainframes to Mi croprocessors. New York: W. W. Norton & Company, 1996. (An entertaining book providing the history of the computer revolution.) Sterling, T. "The Scientific Workstation of the Future May Be a Pile of PCs," Association for Computing Machinery. Communications of the ACM; New York; 39 no. 9, Sept. 1996. pp. 1 1-12. (An interesting article predicting the future of workstation computers.)
DISCUSSION QUESTIONS Distinguish between computer hardware and software. Which most concerns a manager? is the cost/performance ratio much better for a PC than for a mainframe? 3. What is the purpose of a control unit? Can the same control unit control more than one type of device? 4. Why can conversion from one computer to another be a problem? 5. Why is it difficult to convert programs from mainframes to client-server platforms? 6. What is the advantage of a data channel? How much logic must it contain? 7. What are the main limitations of a PDA? 8. What are the uses for a supercomputer? 9. Why are CD-ROMs for computers so popular? What is their main advantage? 10. What are the features of mainframe computers? 11. What features should a high-end server have? 12. What are the main characteristics of the client-server model? 13. Why is a computer manufacturer interested in compatibility within its own line of ma chines? Does a manufacturer want its computers to be compatible with the computers of other manufacturers? What are the advantages and disadvantages of such a strategy? 14. What applications seem best suited to the use of a touch screen? 15. What issues are involved in making a massively parallel computer work? 16. Why does a PC have several different buses? 17. What are the reasons for having secondary storage? Why not just add more primary memory? 18. What are the arguments for having data and servers in a central location? 19. How can networking computers reduce the amount of input and output activity that takes place? 20. Compare and contrast Net PCs with inexpensive personal computers? 21. What is the difference between an image of a page and that same page typed into a word processing program? 22. What is the advantage of a workstation over a larger computer? 23. What factors underlie the trend toward networks of personal computers (clients) con nected to file servers? 1.
2. Why
CHAPTER 8: A PROLIFERATION OF COMPUTERS
CHAPTER 8 PROJECT
S i m o n Marsha l l Associates Simon Marshall has a client who visited its offices and saw the personal comput ers installed there. The client owns a small manufacturing company that creates custom-machined parts for its customers. The company is able to do very high precision manufacturing and has been quite successful in its niche. The client asked Simon Marshall for advice. He had always avoided using a computer be cause he thought it would simply add to overhead and not save any money. In creasingly, however, his machines are controlled by computers, and his two engi neers recommend using some technology in the office. A representative from a systems integrator (a consulting firm that develops so lutions for its customers) visited and suggested a number of possibilities, from a single PC in the office to a network in the firm. The client is confused and has asked Simon Marshall for help. Since they are new to computers as well, they have asked for your recommendations. How should their client proceed to evaluate the proposal from the systems integrator? What sounds like the most appropriate technology for him, at least to get started? Why?
1 95
CHAPTER 9
Is
e
Outline Managerial Concerns
Programming Languages The Contribution of Higher-Level Languages
An Example of a Special-Purpose Language Fourth-Generation Languages Ease Programming Package Programs Are Another Alternative The Web Browser and Internet Standards The Operating System Early Systems The Next Steps Evolutionary Advances Operating Systems for Personal Computers
Focus on Change
Hardware alone is not enough to bring about major organizational changes. It takes software to do anything useful with a computer. As you read this chapter, think about earlier examples of companies that dramatically changed the way they do business. Many of the systems in these firms contain millions of lines of soft Ware code written by people in a painstaking, labor-intensive process. We need im provements in the way people produce software; some are sure to come through knowledge workers developing their own applications using desktop technology. 1 96
CHAPTER 9: SOFTWARE IS THE KEY
MANAGERIAL CONCERNS
Why do managers need to understand software? The choice of software to be used as a standard in the organization for developing applications is an important man agement decision. As you develop the firm's hardware and software architecture, what operating systems will you choose for the servers? What operating system do you want on user workstations? If you want to develop a new system, is it best suited for programming on the company's existing midrange computer using a higher-level business language or a fourth-generation language such as those dis cussed in Chapter 1 8 ? (A higher-level language has statements that are closer to a natural language like English than to the language the computer executes.) The proliferation of personal computers places the manager in the position of a direct hands-on user of computers. What software should the manager buy and use? How does one choose? In this chapter, we explore computer programs and languages along with dif ferent types of operating systems and packaged programs. Table 9-1 shows that different hardware "generations" can be characterized by differences in computer software. (Remember, we defined software as the instructions that tell a computer what actions to take.) In this chapter, we discuss these different types of software. The software presented here is most often used by an information systems profes sional (with the exception of a special language like SPSS). Software that is TABLE 9-1
SOFTWARE GENERATIONS
Generation
Software
First
1 950-1 958
Second
1 958-1964
Third
1 964-1970
Third-and-one-half
1 970-1 980
Fourth
1 980 to present
Machine language Assembly language Assembly language Higher-level languages Batch operating systems Dedicated on-line systems Experimental time-sharing Preponderance of higher-level languages Expansion of packaged systems Operating system mandatory Mixed on-line and batch applications Virtual-memory time-sharing systems Expanded operating systems Virtual-memory batch systems Batch, on-line, and time-sharing mixed Database and communications packages More application programs Higher-higher level or ''fourth-generation'' languages Application generators Virtual-memory operating systems for pes Object-oriented languages Open systems
1 97
1 98
PART THREE: I N FORMATION TECHNOLOGY
likely to be of interest to a user with a personal computer is presented later in the text, particularly in Chapters 1 1 , 18, and 20. We generally divide software into two main types: systems software and appli cations software. Systems software manages the computer and/or provides a set of standard services to its users. The most well-known piece of systems software is the operating system, such as Windows 98. Database management systems, cov ered in Chapter 10, are another example of systems software. A second type of systems software is a programming environment. An envi ronment provides the programmer with a virtual workspace and access to various libraries. The programmer will use existing components of code to speed the de velopment process. Applications software solves an information processing problem in an organi zation. The programs constituting the systems we have seen so far are classified as applications software. Several computer languages discussed in this chapter are used to create applications software. It is hard to overemphasize the importance of software. It is the key that un locks the potential of the computer. Investors think so as well. Look at the most recent market values for Microsoft, a software company, and for IBM, a com pany that sells both hardware and software. As of this writing Microsoft's sales are a little over 1 8 percent of IBM's, but its market value is almost 2.5 times that of IBM's. Programming Languages
Over the last 50 years, the trend in programming has been to make it easier to give instructions to a computer. The objectives of making programming easier are manyfold: • To improve the efficiency of developing new technologies, especially to reduce the elapsed time required to go from an idea to a finished system. • To make it easier to develop systems that are appealing to users. • To encourage nonprofessional programmers, people like you, to develop appli cations themselves without having to rely on a programmer. • To reduce the bottleneck of systems development, the large backlog of sug gested applications that exist in most organizations. • To reduce the number of errors resulting from a systems development effort. • To take advantage of the tremendous increases in speed and cost reductions of hardware by using hardware less efficiently in order to improve the systems de velopment process.
The first computer languages were machine language, the actual Os and I s the computer executes. Programming in machine language was never particularly en joyable, and it certainly restricted programming to a small number of dedicated in dividuals. The first advance in computer software was the introduction of assembly language, a language which substituted mnemonics such as ADD, SUB, MULT for the machine language numbers that perform these instructions. Programmers
CHAPTER 9: SOFTWARE IS THE KEY
There is an old saying in the computer field that "no program is ever fully debugged." Er rors sometimes appear in programs that have been running for a long time due to some untested conditions that caused the error to appear. Typically, the mistake is in some part of the program that was not tested. (It is very difficult and prohibitively expensive to test every possible combina tion of paths through a program.) If you use Microsoft Windows, you sometimes e n counter a message that some action has caused a general protection fault, and you often have to terminate the application in volved. In this case, the system recognized an error, and it tried to let you get around it by closi n g o n e a p p l i cati on rat h e r than restarting the computer. A recent software problem in a cellular phone has caused a great deal of trouble for cellular companies and Motorola in Israel. The Alpha cellular phone, manufactured by Motorola, experienced a software problem in a program embedded in a ROM chip. The phone uses time division multiple access (TDMA) to switch its radio signal from one
channel to another at frequent intervals. This strategy makes it possible for a number of phones to use the same cell at the same time. The software error caused the phone to lock onto one channel and stay there in definitely, blocking other users in that cell from using it, until the offending phone was shut off or its batteries died. The problem re sulted in inaudible voices, poor reception, calls being cut off, and times when the phones did not work. The problem first appeared in Hong Kong and quickly spread to Israel. Cellular service is very popular in Israel and inexpensive, less than 3 cents a minute. Many customers in Israel leave their phones on all the time, and they use cellular phones eight times more than people in the U.S. Motorola re called 1 50,000 of the phones from six coun tries and fixed the problem within six weeks, at a cost of $1 0 to $20 million. Several class action suits were filed against Motorola and a cellular phone company in Israel. Bugs are a major problem; they can be very costly, and even dangerous in applica tions like air traffic control and medicine.
were also able to use variable names such as X, Y, and PAY, rather than try to re member exactly what each memory location contained. Today assembly language is used only by systems professionals, generally in building systems software or special packages. There is no reason for a user to write assembler code. It is interesting to note that Lotus 1 -2-3, a popular electronic spreadsheet program for pes, was originally written in assembly language for speed of execution. Later versions were written in a higher-level language for ease of maintenance and enhancements. The kinds of software you will be using are built up from the foundation pro vided by machine and assembly code. Higher-level languages are often translated into machine language to execute a program. As languages become higher in level, they have more overhead and compute inefficiently. Several organizations have ex perienced embarrassing performance problems using fourth-generation languages for applications they were not designed to process.
1 99
200
PART THREE: I N FORMATION TECHNOLOGY
THE CONTRI BUTION OF HIGHER·LEVEL LANGUAGES
Higher.level languages make the computer easier to program and extend the use of computers to more individuals. The most significant of these languages ap peared around 1957 and is called FORTRAN (FORmula TRANslation). This lan guage is designed to facilitate the use of computers by scientists and engineers and is well suited to solving mathematically oriented problems on the computer. With FORTRAN, we can write a complex formula in one statement, for example,
X
=
(A + B)*(C
-
D)/E
An assembly-language program to accomplish this computation is shown in Table 9-2. The assembly-language version requires eight instructions, compared with a single line for the FORTRAN statement. The FORTRAN statement is at a higher level than the eight instructions required in assembly language. For many problem solvers, particularly nonprofessional programmers, a higher-level lan guage eases the conceptualization of program structure. A number of other higher-level languages have been developed. BASIC is a language very similar to FORTRAN except that it was designed for time-sharing. You can use a variation called Visual Basic to develop applications for Windows 98 on a PC. COBOL (common business-oriented language) was developed to facilitate pro gramming for business applications. An example of parts of a program is found in Table 9-3. For years commercial programs in the U.S. were written primarily in COBOL, creating approximately 30 billion plus lines of COBOL code worldwide. Organizations are seeking alternatives to this language in order to be more produc tive. COBOL is associated with unresponsive, mainframe computer systems, and a large number of firms are only maintaining or enhancing COBOL programs. They are often doing new development work with newer languages and frequently are using alternatives to mainframes. It is unlikely that either COBOL or mainframes will disappear quickly, but the use of COBOL is expected to steadily decline in the future.
TABLE 9·2
AN ASSEMBLY·LANGUAGE PROGRAM FOR THE FORTRAN STATEMENT X (A+BJ*(C-DJ/E =
Program
LOA ADD STA LOA SUB DIV MLT STA
Comment
A B T C o E T X
Load A into the A register Add B to the A register Store the sum in a temporary location Load C into the A register Subtract 0 from the A register Divide the results by E Multiply the results by T Store the final result in X
CHAPTER 9: SOFTWARE IS THE KEY
201
TABLE 9·3
A COBOL PAYROLL PROGRAM SEGMENT 00001
IDENTIF ICATION DIVI S ION .
0 0 0 02
PROGRAM - I D .
00003
AUTHOR,
PAYROLL .
GORDON DAVI S .
00004
*
00005
*
THIS PROGRAM READS HOURS -WORKED AND RATE - O F - PAY FOR EACH
00006
*
EMPLOYEE AND COMPUTES GROSS- PAY .
00007
*
00008
*
00009
ENVIRONMENT DIVI S ION .
0 0 0 10
CONFIGURATION SECTION .
0 0 0 11
SOURC E - COMPUTER,
CYBER- 7 4 .
0 0 0 12
OBJECT COMPUTER,
CYBER- 7 4 .
0 0 0 13
INPUT - OUTPUT SECTION .
0 0 0 14
F I L E - CONTROL .
0 0 0 15
SELECT PAYROLL - F ILE AS SIGN TO
00016
SELECT PRINT - F ILE AS S IGN TO OUTPUT .
0 0 0 17 00018
* *
00019
DATA DIVI S ION .
00020
F I LE SELECTION .
00021
FC PAYROLL - F ILE
00022
LABEL RECORD I S OMITTED .
00023 00024
01
PI CTURE X ( 8 0 ) .
FC PRINT - F I LE
00026
LABEL RECORD OMITTED .
00027 00029
INPUT -RECORD
*
00025
00028
INPUT .
01
PRINT - L INE
P ICTURE X ( 1 3 2 ) .
*
WORKING- STORAGE SECTION
00030
77
OVERTIME- HOURS
P ICTURE
00031
77
REGULAR- HOURS
P ICTURE
99 .
00032
77
GROSS- PAY
P ICTURE
9 9 9 9V9 9 .
00033
77
REGULAR- PAY
P ICTURE
9 9 9 9V9 9 .
00034
77
OVERTIME- PAY
P ICTURE
9 9 9 9V9 9 .
00035
77
REGULAR- TOTAL
P ICTURE
9 9 9 9 9V9 9 .
00036
77
OVERTIME- TOTAL
P ICTURE
9 9 9 9 9V9 9 .
00037
77
GROSS - TOTAL
P ICTURE
9 9 9 9 9V9 9 .
00038
7 7 MORE - CARDS
99 .
P ICTURE xxx .
00039
0 1 PAYROLL- DATA .
00040
0 5 NAME
00041
0 5 RATE - O F - PAY
P ICTURE
9 9V9 9 9 .
00042
0 5 HOUR-WORKED
P ICTURE
999 .
00043
05
P ICTURE X ( 4 2 2 ) .
F I LLER
P ICTURE X ( 3 0 ) .
(continued)
202
PART THREE: INFORMATION TECHNOLOGY
TABLE 9·3-CONTINUED
0 1 DATE-RECORD . 0 5 DATE - IN 0 5 FILLER 0 1 COMPANY-HEADER . 0 5 FILLER 0 5 FILLER
0 0 044 00045 00046 0 0 04 7 00048 00049 00099 00100 00101 00102 00103 0 0 104 00105 00106 0 0 107 00108 00109 00110 00111 0 0112 0 0113 0 0 114 00115 0 0 11 6 0 0 117 00118 00119 00120 00121 00122 00123 0 0 12 4 0 0 12 5 00126 0 0 12 7 00128
PICTURE X ( 8 ) . PICTURE X ( 7 2 ) . PICTURE X ( 5 8 ) PICTURE X ( 17 )
VALUE SPACES . VALUE .
* *
PROCEDURE DIVISION . MAINLINE-CONTROL . PERFORM INITIALIZATION . PERFORM READ-AND-CHECK UNTIL MORE -CARDS
=
' NO ' .
PERFORM CLOSING . STOP RUN . *
INITIALI ZATION . OPEN INPUT PAYROLL- FILE . OPEN OUTPUT PRINT-FILE . MOVE ' YES ' TO MORE- CARDS . READ PAYROLL-FILE INTO DATE -RECORD AT END STOP RUN . WRITE PRINT-LINE FROM COMPANY-HEADER AFTER ADVANCING 2 LINES . MOVE DATE- IN TO DATE -OUT . WRITE PRINT LINE FROM WEEK-HEADER AFTER ADVANCING 2 LINES . WRITE PRINT - LINE FROM DETAIL-HEADER- 1 AFTER ADVANCING 2 LINES . WRITE PRINT-LINE FROM DETAIL-HEADER- 2 AFTER ADVANCING 1 LINES . MOVE SPACES TO PRINT -LINE WRITE PRINT- LINE . MOVE ZEROES TO REGULAR-TOTAL , OVERTIME-TOTAL ,
GROSS-TOTAL .
*
READ-AND-CHECK . READ PAYROLL-FILE INTO PAYROLL-DATA AT END IF MORE-CARDS
=
' YES '
MOVE ' NO ' TO MORE -CARDS . PERFORM PROCESS -AND-PRINT .
*
Many organizations, particularly small ones, use a language called report pro gram generator (RPG). This language is suitable for business applications. RPG provides fixed program logic automatically, and programmers work from special RPG coding forms. The user defines the file, the output files, extra space for the compiler, input record formats, calculations, output, and any telecommunica tions interface. Because much of RPG is structured already, the programmer does not spend time with complex control logic. The language also makes it
CHAPTER 9: SOFTWARE IS THE KEY
easy to update files, and many versions support direct-access files with indices. The dominant language for development on IBM's popular AS400 midrange computer has been RPG. The C language is extremely popular today. This powerful language was devel oped at Bell Laboratories and is used extensively on minicomputers, workstations, and personal computers for developing systems. C is not a language for the casual end user. Systems developers are particularly fond of C because it is very powerful and probably the most portable language around today. That is, software can be moved from one system to another with minimal effort because there are C com pilers for most major computers. Table 9-4 is an example of a C program. Object-oriented programming is a relatively new approach to developing soft ware. The idea is to create objects that are self-contained modules of code. De signers encapsulate a set of data and all valid operations on that data together in an object. All of the objects in a class inherit the characteristics of that class. A class is an abstract concept for a group of related objects. For example, if a class is auto mobiles, the members of that class inherit the class properties of having four wheels, an engine, and doors. The programmer can write programs by putting to gether different modules in different orders. One attraction of object-oriented de velopment is the presence of libraries of objects and procedures. If we could reuse code written in the past for a new application, there would be a dramatic improve ment in productivity.
203
204
PART THREE: I N FORMATION TECHNOLOGY
TABLE 9·4
A C PROGRAM TO COUNT WORDS AND CHARACTERS inc lude - < stdio . h>
#
1* *
Scan s tandard input
and count words and total number
of charact ers i n words .
*
* * * *
A word i s defi ned as any string of Also pri nt
non -wh i te space charact ers .
the average word
( t o one decimal place) .
l ength
DJB
*
I
main { )
{ int n : long c_cnt =
0,
whi l e
( n = get . c_cnt + =n ;
w_cnt =
0;
word { »
{
w_cnt + + ;
} print f { "word count %dspace char count : w_cnt , if
( w_cnt )
print f { "average word length : ( f loat )
} 1* * * *
* *
Get
%d" ,
c_cnt ) ;
the next
c_cnt
I
word by fi rst
charact ers and then make up a word .
% . I f '' ,
w_cnt ) ;
scann ing l eading wh i te space
the non -wh i t e space charact ers
Return
the
scanned i f a word i s found,
that
total number of charact ers otherwi se return
0
(on
EOF) .
I
int get word (
)
{ int c , whi l e
c_cnt = 0 ; ( i s whi t e space { c = getchar { »
; 1 * ignore white space * 1 i f ( c ! = EOF ) { whi l e
( { c = getchar { »
c_cnt + + ; return c_cnt + 1 ;
} else return 0 ;
} 1*
! = EOF &&
)
l i s white space
(c»
1 * plus 1 for missed first char * 1
CHAPTER 9: SOFTWARE IS T H E KEY
E 9-4-CONTI N U E D *
Check i f character i s whi t e space-tha t
includes
*
blanks,
Returns
*
i f whi t e space,
*
int
tabs,
and new l ine charact ers . otherwise returns
1
O.
/ is white space ( c )
int c ;
{ if
(c =
,
,
I I
return 1 ;
c = u
I I
c = u)
else return 0 ;
}
There is an object-oriented version of C called C++. However, the creation of objects in C++ requires a highly skilled programmer. Another popular object oriented language is Smalltalk, which is at a higher level than C++. Others are trying to develop graphical object-oriented languages. In the future it may be possible to develop a program by pointing at objects on the screen to combine them into a program! A higher-level language will often be translated into machine language by a program called a compiler. It accepts a program called the source program and translates it into machine language called the object program. (See Figure 9-1 for a schematic of the compilation process.) Another strategy is to create programs to be interpreted. The interpreter is a program that looks at each of your program's statements, decodes it, and performs the instruction. Interpreters make it easier to change a program and rerun it with out recompilation, something useful when writing and debugging a program. BASIC is a good example of a language that develops programs using an inter preter. When finished, the user runs the debugged program through a BASIC com piler to produce object code. In general, a compiled program executes more quickly than an interpreted program. One of the most important programs today for use on the Internet (see Chap ter 12) is a version of C++ called Java that was developed by Sun Microsys terns. Java is an interpreted program that programmers use to create "applets" (small programs) to be downloaded to client computers connected to the Inter net. When you run a browser such as Netscape Navigator or Internet Explorer on your client PC, the capabilities of the PC to do local processing are not heavily used. The browser basically displays information on the screen, interpreting a format called hypertext markup language or HTML. Your PC is capable of much more processing, but how do you take advantage of its computational capabili ties and protect yourself from downloading a rogue program? How does a devel oper write one program that will run on different kinds of PCs?
205
206
PART THREE: INFORMATION TECHNOLOGY
Source
Source program
compiler-level
in machine
language
language
FIGURE 9·1
Compilation process.
One of Sun's objectives for Java was to break Microsoft's hold on personal com puter software. P rogrammers could write code i n Java that would run on multiple computers using different operating sys tems, not j ust Windows. This original strat egy focused on the desktop; Sun tried to convince Web site developers that they could use Java to safely download pro grams that would execute on a PC. In this manner, a designer could produce an inter active application within a browser (given that the browser had a Java interpreter). For example, one could envision following a baseball game with icons on the screen fol lowing the motions of the real players. A user with an Internet connection could take a tour through a house for sale if a Web site had the appropriate software. Java brings animation to the Web. For this strategy to succeed, everyone writing code needs to use the same Java language. Sun licensed Java but has been unable to control the language. Microsoft and Sun are involved in a legal dispute over Microsoft's version of the language, and Hewlett Packard has developed its own sub set for use on different machines. Web de velopers have used other options for creat ing animation.
However, all is not lost for Sun. P ro grammers feel that Java is a language that allows them to create code twice as fast as other languages. It has features that make it easier to avoid and to find bugs; it is very good for creating reusable objects that re side on different computers on a network. IBM has five different types of server soft ware, and Java's appeal is its ability to cre ate software bridges among a variety of servers. IBM has over 2500 programmers working on Java. Saab USA uses Java to help PC users at its 225 U . S . dealers pull together infor mation about car service, ownership, fi nance, warranties, and other subjects. The system draws data from an I B M AS/400 computer at Saab's U .S. headquarters i n G e o r g i a a n d f r o m a n I B M System/390 mainframe at Saab's parts distributor, and even from older proprietary systems in the dealerships. Java also helps make informa tion from internal systems available on the Web. Sprint PCS, a mobile-phone partner ship, uses Java software to post reports to an internal Web Site, making the informa tion available to thousands of employees instead of just 200. Despite the disputes among vendors, Java is alive and well!
Table 9-5 is an example of a Java applet and Figure 9-2 shows how Java runs on a client computer. Most of us are reluctant to download a program to run on our PCs without some kind of assurance that it will not damage our computer, for ex ample, by introducing a virus. The figure shows how Java protects you from errant programs and how it runs on different PCs. First, the programmer writes code in
CHAPTER 9: SOFTWARE IS THE KEY
207
TABLE 9·5
A JAVA EXAMPLE
Code (A Personal Counter ) <SCRIPT LANGUAGE= " JavaScript" > < !-
II II II II
Copyright ( c ) 1 9 9 7 Mecklermedia Corporation . http : / /www . webreference . com/ j s / License i s granted i f and only i f thi s ent ire copyright notice is included . By Tomer Shiran .
I I name - name of the cookie I I value - value of the cookie I I [ expires ] - expirat ion date of the cookie ( defaults to end of current session
I I [path] - path for which the cookie is valid ( defaults to path of c a l l ing document
I I [ domain] - domain for which the cookie is valid ( defaults to domain of call ing document
I I [ secure ] - Boolean value indicat ing if the cookie transmis sion requires a secure transmi s sion
I I * an argument defaults when it is assigned nul l as a placeholder I I * a nul l placeholder is not required for trail ing omitted arguments function setCookie { name , value , expire s , path, domain, secure ) { var curCookie = name + " = " + escape (value ) + « expires ) ? " ; expires=" + expires . toGMTString ( ) « path) ? " ; path=" + path : " " ) + « domain) ? " ; domain=" + domain : " " ) + « secure ) ? " ; secure" : "" ) ; document . cookie = curCookie ;
:
""
)
+
}
I I name - name of the desired cookie I I * return string containing value of spec i f i ed cookie or nul l i f cookie does not exi st funct ion getCookie ( name ) { var prefix = name + " = " ; var cookieStart Index = document . cookie . indexOf ( pref ix ) ; i f ( cookieStart Index == - 1 ) return nul l ; var cookieEndIndex document . cookie . indexOf ( " ; " , + pre f ix . length ) ; i f ( cookieEndIndex == 1) =
cookieStartIndex
-
cookieEndIndex = document . cookie . length; return unescape ( document . cookie . substring ( cookieStartIndex + pre f i x . length, cookieEndIndex » ;
} (continued)
208
PART THREE: INFORMATION TECHNOLOGY
TABLE 9·S-CONTI NUED II name - name of the cookie I I [path] - path of the cookie (must be same as path used to c],eate cookie )
I I [ domain] - domain of the cookie (must be same as domain used to create cookie )
I I * path and domain default i f assigned nul l or omitted i f no expl i c i t argument proceeds funct ion deleteCookie ( name , path, domain ) i f ( getCookie ( name » { document . cookie = name + " = " + « path) ? " ; path=" + path : " " ) + « domain ) ";
?
";
{
domain= " + domain
expires=Thu ,
"") + 0 1 - Jan- 7 0 0 0 : 0 0 : 0 1 GMT"
}; }
I I date - any instance of the Date obj ect I I * hand a l l instances of the Date obj ect to thi s funct ion fo], "repairs" funct ion f ixDate ( date ) { var base = new Date ( O ) ; var skew = base . getTime ( ) ; i f ( skew > 0 ) date . setTime ( date . getTime ( )
- skew) ;
} var now = new Date ( ) ; f ixDate ( now) ;
now . setTime ( now . getTime ( ) + 3 6 5 * 2 4 * 6 0 * var vis i t s = getCookie ( "counter" ) ; i f ( ! vi s i t s ) { vi s i t s = 1 ; document . write ( " By the way,
60
* 1000 ) ;
this i s your first t ime here . " ) ;'
} else { vi s i t s = parseInt (v i si ts ) + 1 ; document . write ( " By the way, you have been here " + vis i t s + " times . " ) ;
} setCookie ( "counter" ,
I I -> < / SCRIPT>
vi s it s ,
now) ;
CHAPTER 9: SOFTWARE IS THE KEY
FIGURE 9·2
Java translation and execution.
Java. A compiler translates this code into something called bytecode, a representa tion of the Java program that is part way between source code and machine code. The bytecode verifier checks that the bytecode performs only legitimate opera tions. Each client computer that runs Java programs needs an interpreter. This in terpreter is a program written in some language that is translated into the machine language of the client Pc. The interpreter "interprets" the bytecode and does what it says. The interpreter also should check that the bytecode performs only legiti mate operations on the client computer. Using Java applets, the programmer enhances the capabilities of your Web browser. A client PC downloads Java applets and interprets them. An applet might produce animation on the screen; for example, a company can offer real-time sim ulation of a baseball game on the Internet. Alternatively, Java applets might process transactions on the Internet using some kind of digital cash. Using an in terpreter instead of compiling into machine language makes it possible for Java to turn an Internet client into a more equal partner with a server, dramatically en hancing the usefulness of the World Wide Web.
209
210
PART THREE: I N FORMATION TECHNOLOGY
Scripting languages are designed for "gluing" applications together. If ade quate components exist, scripting languages let the programmer develop applica tions more quickly than conventional languages. They also let more people under take casual programming without having to become professional programmers. TCL, Perl, Javascript, and Unix Shell scripts are examples of scripting languages; some consider Visual Basic as it has evolved to be a scripting language for tying together various components to build a graphical user interface. Unlike traditional languages, one would not develop complex algorithms in a scripting language. A two-line script in TCL creates a button control on the screen that displays a string and prints a short message when the user clicks on the button. To accomplish the same thing in C++ requires about 25 lines of code in three procedures. Like Java, scripting languages are interpreted, which means that they may suffer from slow execution. Scripting languages are not a replacement for other languages, but they can save time and labor when applicable. An Example of a Special.Purpose Language
Special-purpose languages are designed with the same philosophy as higher level languages: to extend the capabilities of the computer to users. Frequently, special-purpose languages are translated into a higher-level language that is com piled to produce machine language. An excellent example of a special-purpose language is SPSS (statistical package for the social sciences). This comprehensive statistical system is designed to be used for statistical analysis. SPSS makes it possible to name variables for a particu lar study, save the variable names and data in a file, and create new variables from logical relationships among existing variables. The package features extensive data management facilities complemented by a number of statistical tests including preparing frequency distributions, testing for differences among populations, calcu lating measures of association, performing analysis of variance, and performing a series of multivariate procedures such as regression analysis and factor analysis. Figure 9-3 shows the interface for the Windows version of SPSS (there are ver sions of SPSS that run on mainframes, minis, and PCs). The system allows you to input data by typing it into a spreadsheet program. You can identify each variable or column in the data matrix with a label such as Age, Sex, or Marital status. Then you can use the variables in various statistical procedures that range from a simple frequency distribution to more complex multivariate analyses such as regression analysis. Consider the number of program statements required in a language such as FORTRAN to perform this kind of statistical analysis. Fourth·Generation Languages Ease Programming
A number of software vendors have developed languages that they advertise as be longing to the "fourth generation." Just as compiler-level languages are at a higher level than assembly language, fourth-generation languages (4GLs) are at a higher level than compiled languages. The purpose of these languages is to make it easier to program the computer. One does not have to construct as many detailed steps in writing a program. These languages are particularly appealing to users who need to access data on corporate computers.
CHAPTER 9: SOFTWARE IS THE KEY
a At! requested variables entered. LNHOSTS
b. Depen&iitntVan&ble:
FIGURE
9·3
SPSS regression example.
21 1
21 2
PART THREE: I N FORMATION TECHNOLOGY
The following is an example of a simple program written in FOCUS, one of the most popular fourth-generation languages: TABLE F I LE
SALESDAT
PRINT NAME AND AMOUNT AND DATE BY REGION BY S I TE IF AMOUNT GT 2 0 0 0 ON REGION SKIP - LINE END
This short program accesses a file named SALESDAT and produces a report that contains the region, site, name, amount, and sales if the sales are greater than 2000. The report is sorted by region and by site, with one blank line between re gions. Generating a report like this would require many more statements in a lan guage like COBOL. A fourth-generation language reduces the amount of detail in a program to improve productivity and makes it easier for users to think at a higher level. WebFocus is a product that lets users access a number of databases over an Intranet to retrieve information and generate reports. It is an adaptation of Focus as shown above to run on a system using Internet protocols. PowerBuilder is a popular 4GL for developing applications on a personal com puter, and it is well suited to a client-server environment. A major brokerage firm used PowerBuilder to create an elaborate time recording and charge-back program for its internal systems development group. The use of this language made it pos sible to develop a large application in a relatively short period of time and resulted in a system with an appealing graphical user interface. Figure 9-4 is an example of PowerBuilder code. The latest version of PowerBuilder provides it with Web capa bilities; it is designed now to facilitate the development of applications that run on Intranets and the Internet. Package Programs Are Another Alternative
Package programs are software programs written by a vendor to be sold to multi ple customers. Packages have been available since the first days of computers, but there has been an explosion in their sale and use. One of the reasons for this proliferation is that the technology has matured. There are packages around today in the fourth or fifth (or more) version, improv ing with each version. The other reason packages are gaining in popularity is the requirement to sell personal computer packages. The market for personal comput ers is large, and a vendor knows that it is impossible to provide extensive training to customers who purchase the package. (PCs are often programmed in Visual BASIC, PowerBuilder, or C, but most users work primarily with powerful pack ages.) Therefore, the PC package has to be user friendly and well documented with an easy-to-use instruction guide. It is hoped that these positive features of packages for PCs will influence packages for all types of computers. Although packages are certainly a type of software, we defer detailed discus sion of them until Chapter 1 8, where we present packages as an alternative to the traditional way of developing applications.
CHAPTER 9: SOFTWARE IS THE KEY
FIGURE 9·4 A PowerBuilder application screen and some of the code that produced
it.
21 3
21 4
PART THREE: INFORMATION TECHNOLOGY
Innovatlveprograms. A top-notckfaculty. l'Wodern facilities, which just rocf!lVed
FIGURE 9·5
Stern School I ntranet.
The Web Browser and Internet Standards
A Web browser like Netscape or Internet Explorer is a program that provides a client PC with a graphical interface to the Internet. With this program, you can obtain in formation from thousands of Web sites. Companies have created Intranets using In ternet standards; these networks contain large amounts of company information that is easily available to employees. This browser software combined with the standards of the Internet creates a new way to develop applications. Figure 9-5 shows NYU's Stem School's Intranet; one of the applications is room scheduling. For some reason, a person always had to phone two places to reserve a room, and frequently it was double-booked anyway! The Intranet application makes it simple to use a browser to enter a room reservation request; notification comes within 24 hours via e-mail. Figure 9-6 is a screen from Travelocity, a travel reservations system based on the American Airlines SABRE system. American has written programs to connect a Web server with its transactions processing reservations system, which runs on IBM mainframe computers. The software that makes the connection possible is sometimes called middleware. The server presents this transaction information to browser programs that run on client PCs. Travelocity is available to millions of people who have a Web browser and are connected to the Internet. We discuss the architecture of this system further in Chapter 13. This combination of a Web browser and Internet standards makes it possible to create new applications such as those found on an Intranet, and to extend existing transactions processing systems to millions of users. The standards for HTML and the Internet mean that developers do not have to worry about providing a user in terface program or building a proprietary network. As company applications be come accessible to browser programs, more information appears on the Intranet, and as the Web continues to expand, you may find that the browser program is your primary user interface.
CHAPTER 9: SOFTWARE IS THE KEY
FIGURE 9·6
Travelocity web site.
The Operating System
In the first generation of computers, and for many second-generation installations, the operator of the system had a central role in controlling its use. The operator placed each new program, which had been punched on cards, in the card reader and loaded an assembler on tape. The assembler translated the object program and wrote it on tape; then a loading program loaded it and began execution. For production jobs to be run repeatedly, the object program would be saved on tape or on cards and loaded before execution. It would not be assembled each time it was used. A skilled operator balanced jobs that needed many tape drives with jobs that needed few or no drives so that the large tape job could be set up while the other job computed. In the case of an inefficient operator, the computer might be idle for a large part of the day while tapes were loaded and unloaded. As this scenario in dicates, operations were very inefficient. It became clear that the computer itself could be used to help make operations proceed more smoothly. The first operating systems came into widespread use during the late 1 950s and early 1 960s, with the earliest operating systems written by customers, not computer vendors. It is important to note that operating systems are programs written by program mers. The functions in these programs are different from those in a typical appli cations program, for example, one that keeps track of inventory items. The operat ing system programs, as we shall see in this section, manage the resources of the computer. The operating system is concerned with providing your programs with the resources they need to run on the computer. Early Systems
Batch Monitor The earliest operating systems were simple batch monitors (the terms monitor, executive program, and operating system are synonymous in this discussion) that read special control cards. These cards might include a job
21 5
21 6
PART THREE: I N FORMATION TECHNOLOGY
card containing information about the programmer and the job, for example, run time estimate, lines to be printed, and cards to be punched. Control cards were provided to tell the operator to set up tapes or to prepare any special paper re quired for the printer. The monitor, though simple, sequenced jobs so an entire stack or stream of jobs could be loaded at once. As disks became more common, compilers and work space were assigned to disks so that the operator did not have to mount the com piler, loader, and program object tapes. Operating systems and disk storage have drastically improved the efficiency of computer operations. Multiprocessing During the second generation, at least one manufacturer of fered a multiprocessing system-a computer system featuring more than one cen tral processing unit. In reality, this system consisted of two complete computers. The smaller computer had an operating system and controlled both machines. The larger computer was a "slave" to the smaller machine. The small computer processed all input, and scheduled and printed all output, using disks as a tempo rary storage area. An operating system in the large computer indicated to the con trol machine that it needed service-for example, when it needed a new program to process-and the control computer answered its request. This approach freed the more powerful slave computer from I/O (input/output) and allowed it to con centrate on computations. On-line Systems During the 1960s, the need became evident for on-line com puter access for applications such as inventory control and reservations. The first on-line systems featured custom-designed operating system programs to control the computer resources. Applications programs in an on-line system express the logic of the application and are called by systems programs. The supervisor in an on-line system establishes a series of queues and sched ules service for them. First, the system assembles an incoming message in a com munications buffer. This message may have to be converted into a different code and moved to an input queue in memory by an applications program. The operat ing system notes the addition of this message to the messages-to-be-processed queue. When the central processing unit is available, the supervisor assigns it to process a queue, say, the one with our input message. An applications program called by the operating system might verify the correctness of the message (correct format and the like), after which the message is placed in a working queue. The supervisor calls an applications program to interpret the message, during which time the message may be moved along several different working queues. The supervisor calls different applications programs to process the message fur ther and determine a response. Finally, a program assembles an output message in another queue for transmission to the terminal. The supervisor schedules the CPU to send the output message. This example is considered a multithreaded opera tion. There are a number of tasks associated with each message, and the operating system assigns a CPU to each task as it is ready for service.
CHAPTER 9: SOFTWARE IS THE KEY
The demands on such an on-line system are extensive. A great deal of book keeping is required to enforce and monitor queue disciplines. I/O operations also involve telecommunications activities. There must be adequate fallback and recov ery facilities to prevent and handle system failures. For example, messages may be in process in one of a number of queues when the system fails. Recovery programs must try to restore processing and prevent data files from being corrupted. The Birth of Time-Sharing As computer systems became more heavily loaded during the 1950s and early 1960s, the debugging of programs became a frustrating and time-consuming process. A programmer might be allowed only one test run a day or one run every several days. Programmers found their schedules and lives controlled by machine availability. There is a clear mismatch between the speed with which humans think (and mechanically enter input or review output) and the internal speeds of computers. Could we make computer users feel as though they have exclusive use of their own machine by rapidly switching the computer from one user to another? One programmer's "think time" would be used by the computer for serving other pro grammers. Each user would share the time of the computer, especially the CPU and memory. This special case of an on-line system provides the user with compu tational capability and the ability to write and execute programs.
21 7
21 8
PART THREE: INFORMATION TECHNOLOGY
FIGURE 9·7
Early time-sharing processing.
The operation of early time-sharing systems is illustrated in Figure 9-7. In this representation, only one program is executing at a time because there is only one CPU. A program executes for a short time until it is interrupted and "swapped" out of memory onto a secondary-storage device. Another user's program is swapped into primary memory, and execution begins where it stopped when the program was previously swapped out of primary mem ory. In a simple round robin scheme, each user is given a maximum time slice in
CHAPTER 9: SOFTWARE IS THE KEY
sequence. A program may be swapped out of primary memory even though it has used less than its time slice if it needs to send output or receive input, since these activities are handled by a data channel. The Next Steps
By the early 1 960s, most university and job-shop computer centers used batch monitors, and the commercial time-sharing industry was becoming established. Many business users also used operating systems for their equipment. When the next generation of computers was announced in 1 964, manufacturers had clearly embraced the idea of an operating system. The IBM 360 line could not function without the operating system. An operating system manages the resources of the computer; for example, it handles all input-output through interrupts. In fact, there are special instructions that can be performed by the computer only when it is in "supervisory state" under the control of the operating system. These privi leged instructions are unavailable to programmers, whose jobs run in "problem state." The operating systems also require a certain amount of memory for perma nent resident routines. Other parts of the operating systems are stored on disk and brought into memory as needed. Multiprogramming In our discussion of hardware, we mentioned the develop ment of data channels to take some of the I/O burden from the central processing unit. There was still an imbalance between CPU and I/O, however, even with channels. The batch operating systems used in 1964 utilized multiprogramming, a process very similar to the program-swapping techniques developed for time sharing. In multiprogramming, we have more than one program in a semiactive state in memory at one time. Multiprogramming switches the CPU to another program when it can no longer process the one it is working on because the pro gram must wait for something, for example, the printer. The operating system saves the status of the "stalled" program and looks for another program to work on. The data channel interrupts the CPU to notify it that the printing has been completed, so the stalled program is ready to run again. The operating system de cides whether to continue its current program or to return to the stalled one based on priorities assigned by the user. The presence of one or more programs in a semiactive state in memory with the CPU assigned to one after another is a key feature of many modem operating sys tems. Multiprogramming works because the operating system manages the pro grams that are running on the computer at one time. Multiprogramming time-sharing and an on-line system do the same thing. In fact, if you use Windows 98 on your PC, you launch multiple programs into memory at one time. When you cycle among these applications, you are assigning the CPU to a different program or application. This technique makes better use of the CPU and other resources of the computer. Time-Sharing Time-sharing users often run out of memory. Programmers would like to have limitless memory, or a virtual memory several times larger than physical memory. In virtual memory, as shown in Figure 9-8, a program and
219
220
PART THREE: I N FORMATION TECHNOLOGY
User 2 Page 2 User 1 Page 3 User 2 Page 3
Operating system
FIGURE 9·8
Paging.
its data are broken into pages. Only those pages needed in primary memory at any one time are loaded. Other pages are kept on secondary-storage devices. In a de mand paging scheme, a program executes in memory until it needs a page that is not in primary memory. A request for the page generates a page fault, and the su pervisor locates and loads the needed page from secondary storage. In loading the page, the supervisor may replace an inactive page belonging to another program in primary memory. This entire process is transparent to the programmer, who sees a virtual memory as large as the total number of pages allowed, not the physical size of the computer's primary memory. Evolutionary Advances
The 1970s brought improvements and modifications to operating systems. The major advance took virtual memory out of the exclusive domain of time-sharing and included it in batch systems. Many packages are available to help reduce the problems of developing on-line systems. There are packages to handle inquiries and telecommunications tasks. These packages can be combined with database management systems, which are discussed in . Chapter 1 1 . For mainframes, the dominant operating system has been IBM's MVS (multiple virtual systems), re placed by a new version called OS/390. This newest mainframe operating system is designed to turn the mainframe into a large server and to promote its role in client-server architectures. Midrange computers are likely to feature Unix or Win dows NT, described in the next section. One useful view of an operating system is as a resource manager. The operating system consists of a series of managers, and each manager must accomplish the
CHAPTER 9: SOFTWARE IS THE KEY
following: monitor resources, enforce policies on resource allocation (who, what, and how much), allocate the resource, and reclaim the resource. There are four major resource categories: 1. The memory manager keeps track of what parts of memory are in use and by
whom and what parts are available. In multiprogramming, this manager de cides which process obtains what amount of memory at what point in time. 2. The process manager keeps track of the status of processes. It includes a job schedule that chooses among jobs submitted and decides which one will be processed. (It assigns resources as does a CPU.) 3. The device manager monitors input-output resources-anything connected to the computer through a data channel or bus. It tries to schedule and allocate these resources efficiently. 4. The information manager controls the file system and its directories. Infor mation must be protected, and this manager allocates and reclaims resources, for example, by opening and closing files. Operating Systems for Personal Computers
Our discussion has traced the development of operating systems, and the examples were drawn primarily from large systems. Personal computers also have operating systems, though originally they had fewer features than their mainframe counter parts. The functions of PC operating systems are similar to those of any operating system: to manage the computer's resources. The highest level in the operating system is the command level, seen by users of the system. The lowest level is BIOS (basic input-output system), part of which is actually in read-only memory. All input and output uses the BIOS routines, so there is no need for each application to write codes to control the lowest level of input and output to the diskettes, printer, or display. The operating system provides a number of commands for the user through its graphical user interface. Chips with 32-bit processors and 32-bit memory buses are designed with hard ware support for virtual memory. Chips like the Intel Pentium family require an advanced operating system to take advantage of their power. Many of the features of modern mainframe operating systems are found in supervisory programs for the powerful chips of today, including virtual memory and the ability for the user to have several different active programs in memory simultaneously. There are three major operating systems competing for users of certain minis, PCs, and workstations. Windows 98 offers the user a graphical user interface (GUI). Using a mouse, the user can "click" on a graphical icon on the screen to load a program such as a word processor or spreadsheet, then place this program in a "window" on the screen marked with a border. The user can simultaneously load other programs in other windows and switch among them using the mouse. It should be pointed out that the windowing interface was first an integral part of the Apple Macintosh system. Newer versions of Windows have finally begun to give the PC some of the same ease-of-use features found in the original Macin tosh. [To be completely fair, the whole idea of windows came from Xerox's Palo Alto Research Center (PARC), but Xerox never commercialized its invention.]
221
222
PART THREE: INFORMATION TECHNOLOGY
Of course, as an operating system offers more features, it requires more hard ware to run it, both in terms of primary memory and the amount of disk space re quired to store operating system modules. To run Windows 98 you need at least 32 Mbytes of main memory. The next major contender in the operating systems contest is Unix. This system offers multitasking, a graphical interface (if you add one to it), and high portabil ity. There are versions of Unix that operate on mainframes, minis, and PCs. Unix is written in C, which was originally developed for the purpose of writing an oper ating system. Most of the major vendors of engineering workstations, including Hewlett-Packard and Sun Microsystems, base their systems on Unix. It is also probably the most frequently used time-sharing system on minicomputers. Even IBM, which for years would support only its own proprietary operating systems, now offers a version of Unix called AIX. Unix is available from several different vendors; each version is different enough that a program written in one version may have to be modified to run on another vendor's version. At first, AT&T was the dominant force in defining Unix since Bell Labs developed it. However, AT&T spun off Unix and formed a com pany called Unix Systems Laboratories. Novell bought this company for $320 mil lion in 1993. But in 1 995, in order to concentrate on its core networking business, new management at Novell sold Unix to Santa Cruise Operation, Inc. (SCO), a major Unix vendor. In addition to SCO, vendors selling Unix include Sun, Hewlett-Packard, and IBM. Sun recently released a new version of its Solaris (Unix) operating system, which has 12 to 13 million lines of code compared to NT's 35 million lines. It is possible that the presence of so many versions along with the threat posed by Windows NT, discussed below, will force these vendors to come together for a common Unix. Windows NT is an operating system from Microsoft intended for servers and "power users." Windows NT also illustrates the migration of features from larger computers to smaller ones. For example, Windows NT supports symmetric multi processing, something that in the past was associated only with mainframe oper ating systems. Windows NT takes advantage of multiple, identical processors. Remember that processes can be broken down into different threads (see the ear lier discussion of on-line processing). Windows NT assigns these threads, based on their priority, to the available processors in a multiprocessor system. Manufac turers of various RISC-based technology, such as DEC, are adapting Windows NT for their machines. Companies spend over $50 billion a year on multiuser software, twice what is spent on PC programs. Much of Microsoft's future de pends on being able to capture the server market, and NT is the operating system that is crucial to implementing this strategy. Windows 98 will merge with Win dows NT at some time in the future so Microsoft will only have to support one operating system. Linux: A Free Unix? A graduate student in Norway developed an operating system much like Unix. He posted the code on the Internet and invited different people to expand and extend the system. The result is Linux, which is available for free or for a modest charge. The system is very modular and a person can install
CHAPTER 9: SOFTWARE IS THE KEY
just what is needed. Linux has been used to turn old PCs (486s) into Web servers. Several computer vendors are supporting versions of Linux for their computers. Some view it as a way to challenge Microsoft's operating systems while providing an inexpensive alternative to the "Wintel" combination of hardware and software. One thing is clear: Users want to have systems that are as portable as possible. Portability means that an operating system will run across a number of different computers. We are rapidly approaching the point, at least for minis and worksta tions, where hardware is like any other commodity. The user will not care, and very likely will not know, what hardware is executing his or her programs. The one thing the user will see is the operating system and program interface. These interfaces need to be as common as possible across all types of hardware. Who will win? It is very hard to predict what will happen in the operating sys tems wars. Windows 98 sales have been strong. (Windows 3 . 1 ran on an estimated 100 million computers when Windows 95 was introduced in August of 1 995.) Unix has a solid base of support and is unlikely to disappear. A key question is whether its use will continue to expand. Many experts think that Windows NT will emerge as the winner since Microsoft is such a powerful software vendor. It clearly would like to see Windows NT become the dominant operating system on servers, midrange computers, and desktops. CHAPTER SUMMARY 1. Software is the key to the utilization of computers. As hardware becomes less
2.
3.
4.
5.
6.
expensive and more powerful, we shall continue to see the need to develop software programs for new computer applications. Programming can be a time-consuming and tedious task. However, in the span of four decades, software development has advanced tremendously and com puter languages are becoming easier to use. In a short period of time we moved from machine language to graphical user interfaces and extremely powerful packages for PCs. Each stage depends on the ones that preceded it. A key task of management is to determine what development approach and language are appropriate in a given situation. For most organizations today, the first choice is to buy a package program rather than develop a custom system. Because there is so much software in existence, we should expect to find widely varying standards of quality and functionality. You may encounter a mainframe system that was written 10 years ago and changed through minor enhancements. It is unfair to compare this system with the newest software for Windows 98 ! No organization can afford to redo all of its software at one time. There may be very good business reasons for continuing to use a l O-year-old system, even though its interface and even its functions are outdated. As a manager, you will have to decide how to allocate scarce resources among maintenance, enhancements, and entirely new systems.
223
224
PART THREE: I N FORMATION TECHNOLOGY
7. Operating systems are extremely important components of a computer. Large
mainframes from IBM use OS/390 and run many legacy COBOL applica tions. Midrange computers tend to run Unix, and Windows 98 (or its prede cessor) is dominant for PCs. Windows NT is positioned as an operating sys tem for servers, though a number of companies are using Windows NT on clients as well. 8. There is still much to be done to remove the software bottleneck that exists in developing applications. In later chapters we discuss some strategies to reduce the cycle time for developing applications. IMPLICATIONS FOR MANAGEMENT
Hardware, at least at the level of the PC, is a commodity item. You should be more concerned with the kind of software you can run than the brand of PC you are using to run it. To get something done on a computer, you have to use software. Either you create the application, or you buy it in the form of a software package. For much of what you want to do, it is too costly to use a professional designer or programmer, so you will work with PC software like a spreadsheet and database management system to solve your problems. Since the beginning of the industry, the trend in software has been to make it more accessible and easier to use. Graph ical user interfaces have helped a great deal so that a manager can do a lot by "pointing and clicking." One of the hard decisions you will face is whether to use some kind of software yourself to solve a problem or to tum the problem over to IS professionals. KEY WORDS
Assembly language Batch monitor Bytecode C language COBOL Compiler Device manager Executive program FOCUS FORTRAN Fourth-generation language (4GL) Higher-level language Information manager Interpreter Interrupt Java Linux Machine language
CHAPTER 9: SOFTWARE IS THE KEY
Memory manager Middleware Mnemonic Monitor Multiprocessing Multiprogramming Multithreaded Object-oriented Object program On-line system Operating system Packages Paging Portability Process manager Programming environment Programs Queues Scripting languages Special-purpose language Supervisor Unix Virtual memory Windows 98 Windows NT RECOMMENDED READING Appleby, D.; and J. Vandekopple. Programming Languages: Paradigm and Practice, 2nd ed. New York: McGraw-Hill, 1997. (A good book for understanding concepts, theories, and applications for high-level programming languages.) Fichman, R.; and C. Kemerer. "Adoption of Software Engineering Process Innovations: The Case of Object Orientation." Sloan Management Review, 32, no. 2 (Winter 1 993), pp. 7-22. (A good introduction to object-oriented programming and some thoughts on how likely it is to succeed in becoming the dominant programming methodology. ) Ghezzi, C.; and M. Jazayeri. Programming Language Concepts. New York: John Wiley & Sons, 1997. (A comprehensive reference for all kinds of programming languages.) Gookin, D. C for Dummies (2 volume set). Foster City, CA: IDG Books Worldwide, 1997. (An excellent tutorial for beginners explaining basics of programming techniques from the ground up.) Silberschatz, A.; and P. Galvin. Operating System Concepts. 5th ed. Reading, MA: Addison Wesley, 1997. (This popular book offers both a theoretical and a practical foundation for understanding operating systems with numerous examples.) Tanenbaum, A.; and A. Woodhull. Operating Systems: Design and Implementation, 2nd ed. Englewood Cliffs, NJ: Prentice Hall, 1996. (A fine introduction to basic concepts and working principles of operating systems.)
225
226
PART THREE: I N FORMATION TECHNOLOGY
DISCUSSION QUESTIONS 1 . What motivated the
development of assembly language? What trend did this inaugurate? purpose is assembly language used today? 3. Why is programming such a time-consuming task? 4. Under what circumstances, if any, should managers write programs? 5. What are the advantages of standardized subsets of languages such as FORTRAN and COBOL, that is, a set of statements that are compatible across all compilers? 6. Develop a checklist of the factors to consider in evaluating a packaged program. 7. What is the major appeal of packaged programs for user departments? What is the major disadvantage of these packages for the information services department? 8. How does Java differ from more conventional languages? 9. What are the advantages to breaking up programs into small pieces or modules? 10. Why does a manager care what operating systems are used on computers in the organization? Why should he or she prefer one system to another? 11. What was the motivation behind the development of operating systems? 12. How have time-sharing techniques influenced the development of operating systems? 13. Why are standards like HTML so important for a browser? 14. How does virtual memory contribute to the development of programs? 15. When can problems occur with virtual memory? Under what conditions should we ex pect performance of a virtual memory system to be best? Worst? 16. What is the advantage of a simple programming language such as Visual Basic? 17. What factors influence the choice of a programming language for an application? Why should an organization have standards for languages? 18. Why do some programmers prefer to write a program from scratch rather than modify a program written by someone else? 19. How should programs be tested? What types of data should be used and who should generate the data? 20. What kind of applications will make use of languages like PowerBuilder? 21. Why do users want "open systems"? 22. How is program testing complicated by a client-server environment? 23. How might a browser like Netscape or Internet Explorer become the standard "desk top" for a client computer? 24. What are the major advantages of special-purpose languages? How do they extend computer use to more individuals? 25. Can an entire application be developed with a fourth-generation language? 26. What hardware and software characteristics are responsible for the overall performance of a computer system? 27. How can the quality of software be evaluated? What standards or measures can you suggest? 28. Software program goals include minimizing the number of statements, the use of main memory, the number of runs to debug, and execution time, as well as maximizing out put clarity and program clarity. Which of these goals are incompatible? Which ones should be emphasized by management? 29. Why is it so difficult to replace COBOL applications? 30. Does the extensive use of packages make it more difficult or less difficult to change computer manufacturers? On what factors does the answer to this question depend? 31. What problems do you anticipate in connecting an Internet server to an existing trans actions processing system like SABRE? 2. For what
CHAPTER 9: SOFTWARE IS THE KEY
32. What advantages does
multitasking offer in a PC server? of software does a server for a local area network need to have? 34. What are the differences· between a mainframe operating system and a personal com puter operating system?
33. What kind
CHAPTER 9 PROJECT
'
S i m on Marsha l l Associates Simon Marshall is running Windows 98 on the pes in its office. John Marshall has read articles about "operating system wars" and wonders if his firm is keep ing up with what is happening. "Windows NT, Unix-they're all a bit confusing to me. We've begun to develop some Windows skills-now at least we can paste spreadsheet graphs into our written reports. I also want to get into groupware, as we do a lot of projects together. I know that I will need a network, but I wonder if I should go to a new operating system before thinking about a network. It's all so confusing." What advice can you give John about groupware, networks, and a possible switch to a new operating system?
227
CHAPTER 1 0
e
Outline File Elements
Data Direct-Access Files Storage Media Finding Data on the File More Complex Access Enter Database Management Software
Benefits of the Relational Model An Example Normalization SQL Object-Oriented Databases Databases in Systems Design
Data Modeling The Role of the Database Administrator DBMSs in Building Systems Oracle: An Enterprise DBMS Distributed Databases The Data Warehouse Data Mining Changing Database Markets
228
CHAPTER 1 0: DATABASE MANAGEMENT
Focus on Change
By giving a supplier access to your production and inventory database, you may be able to eliminate your raw materials inventory and have the supplier manage it. The supplier becomes part of your corporation, changing the way both of you do busi ness. As you read this chapter, think about the kinds of databases necessary to create new relationships with customers and suppliers. By saving your experiences in re solving customer problems in a database, you can provide better customer service because your representatives can search the database to help customers who report new problems. This database now contains "knowledge," that is, information and in telligence about typical customer problems with your products. Systems that change the relationship between you and your customers often rely on database technology. •
A typical organization has a large number of files, many of which may be stored on a computer device. We call these data machine readable because you can use a computer to process them. Paper files, on the other hand, are much less ac cessible. Companies frequently refer to related files as a part of a database. This term may be used generically, or it may refer to a specific system or database man agement software. Examples of database systems for personal computers include Paradox and Access. Databases for midrange systems include Oracle and Sybase, and IBM's mainframe database is called DB2. FILE ELEMENTS
Computers store data in a file, which can be defined simply as a collection of data. A computer file is organized in a particular way with a well-defined structure for the information in the file. A computer file consists of a collection of records, each of which is made up of fields. The various fields consist of groups of charac ters, as described below. Data
The smallest unit of storage is the byte, which consists of 8 bits. This byte can rep resent numbers, characters, or parts of an image. The unit of interest in processing business data is the character, for example, the number 9 or the letter A. (We gen erally do not work directly with characters but rather with groups of characters that have some intrinsic meaning, such as Smith or 599. These groupings of char acters are called fields, and we identify them with a name. Smith is an employee's surname and 599 is Smith's department number.) Groups of fields are combined to form a logical record, such as the one shown in Figure 10- 1 . This logical record contains all the data of interest about some en tity. In this example, it has all the data in the file about an individual employee. A key to a record is a specific field of interest that will be used as a basis for storing and retrieving data. Many files are organized on a key: The last name is the primary key for a telephone book; that is, the telephone book is arranged in
229
230
PART THREE: I N FORMATION TECHNOLOGY
FIGURE 1 0·1 A logical fixed-length record.
alphabetical order based on telephone subscribers' last names. A secondary key, in the case of the telephone book, is the person's first name or initial. The tele phone book, then, is arranged in sequence on the primary key (last name), and within the primary key it is arranged in order by the secondary key (first name). Fields designated as keys are also used as a basis for retrieving information from a file. For example, an inventory part number may be the key for retrieving infor mation from an inventory file about the quantity of the part on hand. Direct·Access Files
There are two major types of files: sequential and direct access. Sequential files were the first type of secondary storage. All records are kept in some sequence such as numerical order by Social Security numbers. Most of us will encounter se quential access files only in special circumstances. Records in this type of file are located one after another according to a given sequence. For example, the record with payroll number 1 is followed by the record with number 2, etc. With a se quential file, you cannot find a specific record, such as the person with payroll number 127, unless you read the entire file until you locate a record with payroll number 127. On the average, if there are n records in the file, you will read nl2 records to find the one you are seeking. A direct-access file uses a physical medium and programming, which facilitate the storage and retrieval of specific records. These files are at the heart of database management systems and most of today's file storage technology. The reservations data in an airline's reservations system are stored on direct-access files. Storage Media
The most common device for storing direct-access files is the magnetic disk (see Fig ure 10-2). One type of disk consists of a series of platters mounted on a spindle. The top and bottom of each platter (except for the very top and bottom ones) are coated with a magnetic material like that on a music cassette tape. Read and write heads are fitted between the platters. They float on a cushion of air created by the rotation of the disk and do not actually touch the surface of the platter. By moving the heads in and out, we can access any spot on the rotating disk. Holding the head in one place traces a track on the disk as the platter rotates under the read-write head. The maximum
CHAPTER 1 0 : DATABASE MANAGEMENT
FIGURE 1 0·2
Magnetic disk.
block size or physical record size for a disk file is limited by the physical capacity of each track. Looking down from the top of the disk, the tracks on each surface form a cylinder. When using a disk file sequentially, we write on a given track of the fIrst platter, then on the same track of the second platter, and so on. This strategy mini mizes the access time because the heads make the minimum possible movement. The total access time to read or write is made up of two components: seek time and rotational-delay time. Seek time is the time needed to move the read-write heads from one position to another. Rotational delay occurs because the data we want may not be directly under the read-write heads, even though they are located over the correct track. We have to wait for the disk to revolve to the beginning of the desired data. The total time for seek and rotational delay adds to the average access time for the disk, usually 10-20 milliseconds. Seagate advertises one of the fastest PC disk drives available. The disk rotates at 10,000 revolutions per minute, which gives an average latency of less than 3 milli seconds. The disk is available with a storage capacity of 4.5 or 9 . 1 Gbytes, and transfers data at rates up to 16.8 million bytes per second. The average seek time is 8 milliseconds, and the company claims a mean time between failure of 1 million hours. IBM is selling a disk drive using giant magnetoresistive heads, read-write heads the size of a pin. This 3.5-inch drive holds 16.8 billion bytes of data. Each track on the disk has an address. Usually, manufacturer-supplied software lets us specify a fIle and record size, and then retrieve a specific record. The records are numbered 1 through n, where n is the number of records in the fIle. Thus, we can treat a fIle as consisting of a group of separately numbered records without concern for the physical track address where the record is stored. The
231
232
PART THREE: INFORMATION TECHNOLOGY
software associates the track address with a logical record and finds the desired record for MS. The diskette drive for a personal computer is similar to that for a hard disk except that the diskette has only two sides. The read-write head actually touches the floppy disk when accessing the file. Finding Data on the File
In a sequential file, finding the data you want is not too difficult, though it may be time-consuming. Each record is in a sequence, so you simply read the file until you get to the location of the record of interest. (This is the reason why sequential files are associated with batch processing and usually with magnetic tape. You up date the file at one point in time and make all the changes, reading the file just once and creating a new version.) The major advantage of the direct-access file is, as its name implies, that you can locate any record in the file in roughly the same short (milliseconds) period. For example, when you call an airline, they want to access the inventory of seats for the flight you want to take on the date you want to fly without having you or the agent wait on the phone. If we request a record number, the file management software will supply it for us; then we must associate the logical record number with the information desired. For example, in an inventory application, how do we know where information on inven tory part number 1432 is located? What logical record contains data on part 1432? One solution is to begin at the first record on the file and read each record until we find part 1432, but this is simply scanning the file sequentially. Another solution to our problem is to create an index like the index to a book. The computer looks up the logical address for part 1432 in the index and then retrieves that record from the disk. Key
Index entry
Record address
1 432 4293
1 432-3 12 4293-137
312 137
We search the index in primary memory (which is several orders of magnitude faster than searching the disk itself) looking for the key. The index entry tells us at what record that key is located. See Figure 10-3. More Complex Access
So far in the discussion of direct-access files, we have talked about how to locate a unique primary key such as an inventory part number. (This key is unique because there is only one part with a given number.) More complex structures are also pos sible with direct-access files. For example, we can ask questions about how many parts are needed for a particular assembly and obtain a response. Consider an in ventory example in which it is desired to keep track of which parts belong in what assembly. This situation is depicted in Table 10-1 (a). We wish to define a file structure to answer questions such as what parts in inventory are used to build as sembly number 103. To find all parts used in assembly 103, it is possible to read each record and see if the assembly field is equal to 103. In Table 10- 1(a) we read record 1 , which is used in assembly 103. Then we read records 2 and 3 without
CHAPTER 10: DATABASE MANAGEMENT
Index
�
Address
1432
312
4293
137
137
4293
312
1432 Doe, John · · ·
Smith, Jane · ·
•
FIGURE 1 0-3
I ndex lookup.
TABLE 1 0-1 (A) FILE EXAMPLE
Record
Part no.
Assembly
On hand
2 3 4 5
4326 6742 8 1 37 321 8 3762
1 03 607 12 1 03 607
27 51 1 00 13 43
Vendor
ACME JOHNSON DAWES FRAZIER ARMOR
finding assembly 103. We find it again at record 4, and so on. Clearly, this process is not very efficient as there could be 100 records between each occurrence of as sembly 103. To avoid this excess read time, we use a pointer-a piece of data whose value points to another record. In this case it points to the next record where assembly 103 is found. The inclusion of pointers in the file is shown in Table 1O- 1 (b). The pointer
233
234
PART THREE: I N FORMATION TECHNOLOGY
TABLE 1 0·1 (B) FILE EXAMPLE
Record
Part no.
Assembly
On hand
2 3 4 5
4326 6742 8 1 37 321 8 3762
1 03 607 12 1 03 607
27 51 1 00 13 43
Vendor ACME JOHNSON DAWES FRAZIER ARMOR
Pointer 4 5 13 42 1 06
TABLE 1 0·1 (C) INDEX TO ASSEMBLIES
Assembly
Record
12 25 1 03 1 04 607
3 212 1 62 2
in record 1 points to the next occurrence of assembly 103 in record 4. Now, when looking for assembly 103, we retrieve record 1 and examine the pointer field. It tells us that the next occurrence of assembly 103 is at record 4. We follow the chain of pointers through the file to answer the retrieval question of what parts belong in as sembly 103. This type of file structure is known as a linked list or a chained file. How do we find the record of the first part in assembly 103? We could read the file sequentially, but there might be 500 or 600 records before the first part in as sembly 103 is located. This problem is easily solved using an index like the one in Table 1O- 1 (c). This index simply points to the first part contained in assembly 103. First we retrieve this record and then we follow the chain of pointers in each record through the file. While you will probably never work with a direct-access data file at this level of detail, the discussion of pointers running through a file is very important in Chapter 12, when we discuss hypertext, which is a way of linking text entries in files stored on different computers around the world. In this case, a highlighted word has a pointer to further information about that term, possibly stored on a computer thousands of miles away ! ENTER DATABASE MANAGEMENT SOFTWARE
Creating complex files using the techniques described above and many others is a tedious and error-prone process. In the 1960s, software vendors developed products called database management systems (DBMSs). These examples of systems software automate many of the tasks associated with using direct-access
CHAPTER 1 0 : DATABASE MANAGEMENT
FIGURE
1 0·4
A relational database.
files. As with other types of software originally developed for large computers, a large number of sophisticated DBMSs for personal computers exist today. A DBMS has to provide: • • • •
A method for defining the contents of the database. A way to describe relationships among data elements and records. A mechanism to set up the database in the first place. Ways to manipulate the data including: Updating (adding, modifying, and/or deleting information). Using complex criteria to retrieve selected data.
Benefits of the Relational Model
The relational model is the dominant structure for vendors writing DBMSs. The underlying concept of a relational file system is very simple: Data are organized in two-dimensional tables such as the one in Figure 10-4. Such tables are easy for a user to develop and understand. One virtue of this type of structure is that it can
235
236
PART THREE: I N FORMATION TECHNOLOGY
be described mathematically, a most difficult task for other types of data struc tures. The name of the model is derived from the fact that each table represents a relation. Because different users see different sets of data and different relationships among them, it is necessary to extract subsets of the table columns for some users and to join tables together to form larger tables for others. The mathematics pro vides the basis for extracting some columns from the tables and for joining various columns. Relational database management systems have many advantages. Most DBMSs for personal computers are based on the relational model because it is relatively easy for users to understand. This section presents an example of a relational data base and shows how it would be processed by a personal computer DBMS. We also discuss some of the key issues in the design of relational databases. An Example
Figure 10-5 shows the results of creating two relations using a DBMS called Ac cess, a part of Microsoft Office, and entering data in them. The first relation is Stu dent; the key is student number, and the other fields are name, age, and year in school. The second relation is Class, and its key is also student number; the rela tion relates student number to class number. Figure 10-6 shows how Access can be used to inquire about all students who are in year 1 . The user fills out a table describing the inquiry and indicates each desired field for the answer, then indicates the criteria for selection. In this case, the criterion is that year = 1. The DBMS places the answer on an output screen. One of the most frequently used relational operations is the join, in which two relations are joined on some key. Figure 10-7 shows how the DBMS would be
FIGURE 1 0-5
Setting up two relations.
CHAPTER 1 0: DATABASE MANAGEMENT
used to join the Student and Class relations. Note the line the user drew between student number in each relation. That line tells Access the common field on which the two relations are to be joined. Figure 10-7(a) shows the query form, and the results of the join are shown in Figure 1O-7(b). We now have a list of each student assigned to his or her classes. Note that Murray does not appear in the join because there was no record for Mur ray in the Class relation. Similarly, student 160 is listed as taking two classes, so Berman appears twice in the joined relation.
FIGURE 1 0·6
Inquiry about students in Year 1 .
(a)
(b)
FIGURE 1 0·7
Joining two relations. (a) Query form. (b) Results of the join.
(a)
(b)
237
238
PART THREE: INFORMATION TECHNOLOGY
Normalization
One of the major tasks in designing a relational database is normalization. The process of normalization ensures that there will not be any problems in updating the database and that operations on the various relations will not lead to inconsis tent and incorrect data. Kent (1983) presents a set of guidelines to make normalization more intuitive and easier to understand than the mathematical rules for normalization. During the normalization process, the designer first looks to be sure that the relations are in first normal form (discussed below). Next, he or she checks for second normal form and finally for third. (There are also fourth and fifth normal forms, but we leave them for more advanced courses on databases.) First normal form requires that all occurrences of a record type contain the same number of fields. As a result, a record cannot contain a repeating group. We could not have one relation that listed facts about a class and have a repeating set of fields for each student in the class. To represent such a problem using the rela tional data model, we would need more than one relation. The first would be a re lation for the class and the second a relation for students. Second and third normal forms require the examination of the relationship be tween key fields and other fields in the record. To conform to second and third normal forms, each field that is not a key must give us information about the entire key and nothing but the key. (Each higher number form assumes that the relations satisfy lower number forms. For example, second normal form assumes that the relation is in first normal form, and so on.) Suppose that one has a relationship as follows: Part
Warehouse
Quantity
Address
If Part and Warehouse form a composite key, this relationship is not in second nor mal form. Note that the warehouse address would be repeated in each record that stores information about a part in the warehouse. If the address changes, every record of a part in that warehouse would have to be updated. The update would re quire a great deal of processing and could result in an error if one address were overlooked. What would happen if there were no parts in the warehouse? It is pos sible that the database would lose track of the warehouse because there would be no record having its address. The relation can be made to conform to second normal form by splitting it into two relations: 1.) Part Warehouse
Quantity
2.)Warehouse
Address
Part Warehouse can be the combined key for the first relation, and Warehouse can be the key for the second. Now the warehouse address appears only once in the database and can easily be changed. We succeeded in normalizing the relation so that it is in second normal form. Third normal form requires that a nonkey field not be a fact about another non key field. Kent offers the following example: Employee
Department
Location
CHAPTER 1 0 : DATABASE MANAGEMENT
The key to this relation is Employee. If each department is located in only one place, the location field is a fact about the department in addition to being a fact about the employee. This design leads to the same problems as with the warehouse example: The location is repeated in each record of an employee assigned to that department. Because of this redundancy, the data might become inconsistent and a department with no employees might disappear from the database. The solution here is similar to the one above: split the relation into two relations: 1.) Employee
Department
2.) Department
Location
where Employee is the key for the first relation and Department is the key for the second. In general, normalization creates a database in which there is minimum redun dancy of data, and risks of damaging the database through updating are minimized. Because the relational model is the dominant data model, it is important to under stand the normalization process. There are many different relational database man agement systems available, each with its own set of commands. A single query lan guage would be of great value, especially when one needs to retrieve data from different systems. Structured Query Language (SQL) has become such a standard. IBM developed SQL a number of years ago. The language was first proposed as a retrieval language for users, but it is difficult to use; consequently, few users are likely to master it. It is important to note that SQL is the query language for IBM's mainframe relational database management package, DB2. There is an ANSI standard for SQL, and this language has been adopted by the major DBMS vendors as one way to interact with their systems. SQL also offers a mechanism for universal database access. For example, suppose the DBMS you are using translates the query language you enter into SQL commands. It could then retrieve data on a different system, so long as they both used the same SQL dialect. The basic structure of an SQL expression has three parts: 1. The select clause lists the attributes desired in answer to the query. 2. The from clause is a list of relations or tables that the query language proces sor should consult in filling the request. 3. The where clause describes the attributes desired in the answer.
As an example, consider the following SQL expressions taken from Korth and Sil berschatz ( 1 986): select branch-name from deposit
This is an SQL expression to obtain a list of all branch names from a bank table (branch-name) containing data about branches and customers. One might find all customers having an account in the Midtown branch with the following expression: select customer-name from deposit where branch-name= "Midtown"
239
240
PART THREE: I N FORMATION TECHNOLOGY
SQL expressions can become complicated as we qualify retrieval requests: ( select customer -name from deposit where branch-name= "Midtown" ) intersect ( select customer -name from borrow where branch-name= "Midtown" )
This query produces a table of all customers who have both a loan (from the bor row table) and an account in the Midtown branch. There has been a proliferation of database management systems for all types of computers, with SQL appearing to be one common feature. Various vendors de sign their DBMS packages to translate queries using the package's interface into SQL commands to query a remote database. Why would a user be interested in such a feature? Suppose you are working with Access, a PC database system, and want to ac cess data located on an IBM mainframe in a DB2 database. You would like to enter Access queries and not have to learn about DB2. Using an SQL interface, Access could access the data you want on the mainframe. Of course, Access must translate your queries into SQL and forward them to the DB2 for process ing. You would have to know the names of the fields and the relations in the DB2 database. The use of SQL as an intermediary and a standard in accessing a large number of different types of database systems should be of great help to users and to sys tems analysts. Although you may never formulate a query in SQL, you are likely to find it processing queries developed in other languages. Object·Oriented Databases
Relational database systems are extremely popular in business; they excel at repre senting typical business data such as orders, sales, financial results, and so on. However, there are applications that require a database to store very complex ob jects, such as computer-aided design systems. Think of all of the possible objects on a parts diagram for a subassembly of an automobile. It is hard to imagine how this information would be stored in a relational system. However, if the database is designed to store objects instead of relations, then a solution is easier to envision. Each object has an identity number that the database uses to store and retrieve it. Our discussion of systems design includes a description of object-oriented design. The characteristics of an object-orientation also apply to an object-oriented data base. An object is a member of a class of similar objects, and it inherits the gen eral characteristics of objects in its class. In the computer-aided design example, it is likely that most storage and re trieval requests will be associated with a single object on a particular drawing. It is unlikely a designer would ask to see all bolts used in a design at one time. He or she is much more likely to ask to see a specific bolt as a component of an
CHAPTER 1 0: DATABASE MANAGEMENT
assembly. However, in a business application, a user might ask questions that require a system to process a number of rows in a relational table. An object oriented database could be quite slow handling this kind of request. Thus, the designer has to consider carefully the nature of the application in selecting a database management system. DATABASES IN SYSTEMS DESIGN
It should be apparent at this point that one of the major design tasks in building an information system is determining the contents and structure of a database. The type of retrieval and reporting required by users and the availability of input deter mine what data to store. However, it is a very complex task to specify these data, group them into records, and establish data structures for a system. Data Modeling
A data model is useful for a number of reasons. First, it helps us understand the re lationships among different components in a systems design. Data models show users more clearly how a system will function. The most common type of data model is the entity-relationship (ER) dia gram. The ER diagram is easy for a user to follow and serves as an excellent com munications vehicle. The ER diagram consists of object types and relationships. In Figure 1O-8(a) we see an example of two objects linked by a relationship: A cus tomer purchases a product. The two entities here are "customer" and "product;" the relationship is "purchases." Entities are represented by rectangles and relation ships by diamonds. Some analysts like to use a simple, straight line between enti ties and label the line with the relationship, as shown in Figure 1 0-8(b), though certain more complex relationships cannot be modeled in this manner.
FIGURE 1 0-8
(a) An entity relationship (ER) diagram. (b) An alternative ER diagram.
241
242
PART THREE: INFORMATION TECHNOLOGY
FIGURE 1 0·9
Doctor-patient ER diagram.
Entities also have attributes, which are the fields we would include in a file record. A product has a product number, size, description, price, cost, and so on. The ER diagram, then, can be used to show relationships, while the conventional listing of the file contents contains the attributes of entities. Figure 10-9 shows another example of an ER diagram. Here the figure shows that a doctor sees a patient. The doctor writes a prescription, and the receptionist bills the patient. The numbers on the ER diagram describe the nature of the rela tionship. There is one doctor who writes from 1 to n prescriptions. In this practice, one doctor sees many (n) patients. The receptionist sends n bills to many (n) pa tients. Many patients buy one or more prescriptions. We can have 1 : 1, 1 :n, n: 1 , and m:n (many-to-many) relationships among entities. Another way to show the nature of relationships is to use arrows. A single arrow stands for a "one" relationship, and a double arrow represents a "many" re lationship. For users, the added information provided by describing the nature of the relationship is probably not worth the added confusion; these data are pri marily useful to the designers of the system. Figure 10- 1 0 is a data model for a student applying to college. A student completes an application, and the admissions staff make decisions about many applications. The staff notifies candidates by sending out a letter. The round cir cles in the E-R diagram are attributes of an entity. The application entity has three attributes : an identification number, the decision (accept, reject, post pone), and a date.
CHAPTER 1 0: DATABASE MANAGEMENT
FIGURE 1 0- 1 0
College application ER diagram.
In another example, Figure 10- 1 1 shows the relationship of a student with his or her adviser. The adviser counsels many students, and these n students enroll in m different classes-an n:m relationship. Each student has a gender, year, and age, and there are many different majors from which the student can choose. Figure 10- 1 1 presents an entire simple database. However, there can be other views for different individuals. A professor might care only about a class list, not about a student's major or adviser. The department chairperson wants to know something about majors in the department. Sometimes these differences are called logical views of the data. It is very likely that different users will have different logical views of data. A key task when designing the database is to integrate these many potential views and create a physical database capable of supporting different logical views with adequate performance.
243
244
PART THREE: INFORMATION TECHNOLOGY
FIGURE 1 0-1 1
Student-adviser ER diagram.
The Role of the Database Administrator
Many organizations using database software have created a new position known as the database administrator (DBA). This individual is responsible for working with systems analysts and programmers to define the physical and logical views of the data to be manipulated by computers. DBMSs in Building Systems
Database management systems are very popular packages for personal computers. These packages feature friendly interfaces that make it easy for users to define the
CHAPTER 1 0: DATABASE MANAGEMENT
Oracle sells one of the most popular rela tional database management systems. The company has developed a 64-bit version of its system; that is, the software will take ad vantage of processor chips that fetch and perform operations on 64 bits at a time. This DBMS will run on the DEC's Alpha chip, one of the fastest chips currently available. The two companies claim that a 64-bit database on an Alpha g ives serious competition to mainframe databases. The 64-bit version allows much more of a database to be processed in main memory at high speeds. With 64-bit processing, it takes fewer operations to move data from secondary storage into main memory.
Of course, not everyone will sell their mainframes and rush to the new system. It is costly and time-consuming to convert ap plications. There are many applications on the typical mainframe, so all of them would have to be converted before one could elim inate it. Also, the cost savings are debat able. Forrester Research estimates that it costs three times more to support a 5000user network of computers than it does to s upport an equal n u m b e r of users on a mainframe. Certainly at the level of the processor and DBMS, 64-bit technology has to be a threat to mainframe vendors over the long term.
structure of relations and enter data. Using the system, it is possible to update data, process transactions, make queries, and generate reports. Most of the PC DBMS packages also have development tools or languages, and users have developed many applications using a DBMS. A programmer, for example, can use Access to create an order-entry system for a small firm. Using the development language, the programmer can set up a system so that users do not have to know anything at all about the database system. Instead, users see menus from which they choose options. The DBMS processes the menus and manages the application. There are a number of database management packages for different types of computers from mainframes to PCs. Particularly for smaller systems, a modern DBMS can sometimes serve as the only systems-building tool needed to develop an application. Oracle: An Enterprise DBMS
The Oracle Corporation is the leading vendor of databases at the enterprise or en tire firm level, claiming to have a 50 percent market share for server database sys tems. Today the company positions its primary database system called Oracle n, where n is the most recent version, as a database for network computing for the enterprise. Oracle's view of hardware and software architecture is what they call "server centric." They mean that most of the heavy processing takes place on the server, with the client having limited logic. One of the arguments in favor of this architec ture is control and the ability to respond to change. If databases are distributed
245
246
PART THREE: I N FORMATION TECHNOLOGY
across a number of clients, it is easy for data to be in conflict and difficult to en sure that changes reach each machine. Keeping a database centrally on one or more servers reduces the problems of data management. Oracle offers an extended relational data model and uses SQL for queries. The first relational database systems supported only alphabetic and numeric data types. Today there are many types of data including images, documents, audio, and video, to name a few. Rather than have a separate system for each, Oracle has ex tended its DBMS to support a variety of data types. In Part IV on systems analysis and design, we will discuss object-oriented de sign. Briefly, "business objects" represent common entities found in the business such as an invoice, order, product, and so on. In object-oriented design, an object contains data about an entity and the procedures needed to modify those data. The relational model stores data in rows, not according to an object definition. Oracle has the ability to essentially map data from a relational database so that it looks as if one is working with an object that encapsulates its data. Oracle's latest version of its DBMS will support tens of thousands of users, ac cording to the company. It also can process huge amounts of data, tens of tera bytes or more, to support the kind of highly detailed, dis aggregated data that companies like to analyze. The company also provides support for using Java in combination with its DBMS to develop applications. In addition to offering its DBMS as a product, Oracle has used it to develop a number of applications pack ages consisting of 35 integrated software modules for tasks such as financial management, supply chain management, manufacturing, human resources, and sales force automation. Distributed Databases
Organizations are building more distributed databases in which different parts of the database are located on different computers in a network. The movement to ward client-server computing and the implementation of groupware will accentu ate this trend. This type of database raises a number of issues for the organization, including the following: • Will data be replicated across computers, or will there be only one copy? • If data are replicated, how frequently must different versions be updated to re flect changes? (At times there will be different values for the same data if all copies of a file are not updated at once.) • How will updates to the database be coordinated so that its integrity is maintained? • Who "owns" distributed data, and who has access to it? • Distributed databases offer users easier access to data at the cost of overall higher complexity of the system. The Data Warehouse
Businesses collect a tremendous amount of transactions data as part of their rou tine operations. Marketing departments and others would like to analyze these data
CHAPTER 1 0: DATABASE MANAGEMENT
Bank of America regularly creates a database that consolidates 35 m i l l i o n records processed by separate computers handling checking, savings, and other routine transac tions. The consolidated database has 800 bil lion characters of data. How does the bank use this i nformation? Every day about 1 00,000 customers call the bank to check a balance, challenge a charge on a credit card, or ask about interest rates. The bank decided to try to sell them something when they call. The way to accomplish this cross selling was to tailor the product to each customer's needs. For example, if you have been acci dentally bouncing checks, maybe you would pay for overdraft protection. The consoli dated database provides bank employees with incredible insights into customer behav ior and preferences. Some companies call these applications "data warehouses" for ob vious reasons. Burlington Coat Factory depends on a 1 .5 trillion byte database that runs on a clus ter of eight superminicomputers from Sequent computer systems. Company managers use
the warehouse to determine a variety of infor mation, for example, what styles are selling best, how are different stores performing, where to open the next store and so on. These data warehouses are good candi d ates for paral l e l computi ng-multiple processors working in parallel are powerful and cheap enough to perform analyses on billions of bytes of data. John Alden Life In surance company has a warehouse with four years of detailed medical claims with extensive cross indexing, comprising some 1 50 billion bytes of data. The company fig ures that asking a question to compare hos pital networks in Illinois and New Jersey on hip replacements would tie up a mainframe all night. A 24-processor IBM SP2 does this job in the "tens of minutes." The computer can scan for information users request, or it can look for interesting relationships and patterns, a process called data mining. This kind of technology pro vides you with the ability to understand your customers and the nature of your business far better than in the past.
to understand their business better. For example, you might ask to see a display of sales by region, for the current period, compared to the same time last year. After seeing this display, you may want to see the analysis by product group, then prod uct group for the last six months, and finally the same data by sales team. Instead of the two dimensions associated with the relational model, you are asking for a multidimensional analysis. To accommodate this kind of analysis, sometimes called OLAP for on-line an alytical processing, firms offer multidimensional databases for data warehousing. You must define the various dimensions of your business so the system can pro vide summaries based on those dimensions. The idea is to let you ask questions involving a number of factors without having to be familiar with the underlying organization of the data. See Figure 10- 1 2 for an example of how a multidimen sional view differs from a relational table. One strategy for creating the "data cube" associated with a multidimensional database is to create a "fact cube" through an n-way crossing of all the dimensions specified when defining the
247
248
PART THREE: I N FORMATION TECHNOLOGY
FIGURE
1 0-1 2
Multidimensional databases.
A data warehouse at the National Associa tion of Securities Dealers (NASD) helps to keep trading activity on the level. There are some 550,000 registered traders buying and selling an average of 700 million shares a day on the NASDAQ Exchange. The NASD is building a regulatory data warehouse that will hold 1 .4 terabytes in total and will grow by 4 Gbytes per day. Officials will use re ports from the warehouse that are produced within 30 minutes of the close of the market. I n o n e year, NAS DAQ m o n itors f o u n d 26,000 possible trading problems that led to an investigation.
The data ware h o u s e r u n s on a 1 6processor system using Oracle7. Programs manipulate transactional data from the mar ket reporting system and load it into the ware house. The system employs data-mining tools to apply pattem recognition to the data in a search for suspicious activity and trading trends. The NASD creates smaller datasets on Sun SPARe servers so that analysts can investigate in more detail information on late trade reporting, member profiles, and other topics. Over the next few years, the number of users of the warehouse is expected to grow from 25 to over 500.
database. It is likely the multidimensional database will store only valid entries to save space. For example, not all products might be sold in all regions, leaving empty locations in the cube. One objective of a data warehouse is to help you understand your business better. This kind of technology, then, helps create a "learning organization," an or ganization that is able to better understand its market, customers, and itself.
CHAPTER 1 0: DATABASE MANAGEMENT
Data Mining
One of the reasons for building a data warehouse is to undertake data mining. The idea is to look for interesting and important patterns in a huge database. A com pany like MCl wants to learn about its customers, to serve them better, and to avoid losing them to competitors. One strategy is to look through marketing data on 140 million households characterized by as many as 10,000 attributes. These variables include income, lifestyle, and past calling habits. However, it is hard to know which attributes are the most significant. MCl uses a supercomputer to com pute a set of 22 detailed (secret) statistical profiles of its customers. MCl can tar get different profiles with custom promotions, develop plans for selling new ser vices and packages, and enter into joint marketing programs with other firms that are geared to customers that fit a certain profile. Data mining is also being used by NBA basketball teams to analyze the thousands of bytes of statistics that each game generates and by the Treasury Department to look for evidence of financial crimes through an analysis of money transfers. Data mining is associated with knowledge discovery systems, applications that try to make sense out of data. Databases are an important component of these sys tems as they contain large amounts of data that may provide a decision maker with knowledge. Programs for data mining and knowledge discovery help sift through all these data and offer ideas to the decision maker. They are another type of deci sion support system, which we discuss further in Chapter 2 1 .
249
250
PART THREE: INFORMATION TECHNOLOGY
It has been estimated that about 90 percent of the data in the world is not in relational databases; it is scattered across I nternet Web sites, legacy applications, and nonrela tional databases. Virtual database technol ogy makes external data sources a part of your corporate, relational database system. With virtual database software, you can make queries of data that are scattered over a variety of locations and stored in different ways. To find a job for a marketing manager position in a company at a certain location where the company's sales are growing at 25 percent a year would require an exten sive search of Internet job directories. A vir tual database allows the user to make one query. The database consolidates job list ings from many sources and develops in dexes for job title, category, and other attri b utes of t h e l i s t i n g s . The progra m m e r accesses t h e virtual database using stan dard Sal commands while the end user might work with a query form on the Web. There are currently a number of virtual database applications on h igh-traffic Web sites such as Yahoo! and the Wall Street
Journal Online. It is also possible to com bine external data with a company's inter nal data warehouse to expand the range of data-mining and knowledge discovery programs. Virtual database technology is also very useful for electronic commerce. J u n g l e e Corpo rati o n , a s u bs i d i a ry of Amazon.com, uses a virtual database to in tegrate data from m ultiple m e rchants to give shoppers comparison data. One exam ple is a virtual database that combines the contents of Amazo n . c o m a n d Powe l l ' s Books with the New York Times Book Re view; t h e result is a u n i f i e d , relational schema with two tables: books and reviews. Junglee has also applied this technology for classified employment ads, real estate, and apartment listings. V i rt ual database tech nology extends databases beyond the confines of the orga nization; it provides consistency in access i n g data that originate in many d ifferent places and that is stored in different ways. The result is an extremely powerful tech n o l o gy for accessi n g t h e trem e n d o u s amount o f data that exists i n automated databases.
Changing Database Markets
Sales of database management systems have been declining after a long period of growth. One problem has been the rise of the Internet, which is slowing the growth of the market for the traditional DBMS. Companies are implementing new appli cations on the Internet to provide employees and customers access to data that they already store in a DBMS, probably on a midrange or mainframe computer. Frequently data on the Internet involve multimedia objects. This trend creates an other problem for relational database vendors as customers seek object-oriented databases, which are particularly useful for multimedia data. The major vendors offer hybrid databases that combine relational and object oriented features, though these have had mixed success compared to completely object-oriented databases. (To learn more about object-oriented design, please see Chapter 15.) DBMS sales are also affected by the movement toward packaged software, particularly enterprise software from Baan, SAP, and PeopleSoft. These applications have built-in database capabilities and appeal to customers who do not want to do their own systems development and programming.
CHAPTER 1 0 : DATABASE MANAGEMENT
A Acxiom is a company in Arkansas that main tains a huge amount of data about all of us. Twenty-four hours a day the company gath ers and sorts i nformation on 1 96 million Americans. The data come from credit card transactions, magazine subscriptions, tele phone numbers, real estate records, car reg istrations, and fishing licenses, to name a few sources. The company typically does not provide information on individuals. Rather it identi fies thousands or mill ions of people at a time who fit a particular profile. For exam ple, a company purchasing a list of names and addresses might ask for individuals within a certain age range or weight who drive certain makes of cars and use certain
credit cards. For a bank wanting to send solicitations for a credit card, Acxiom might look at financial information and classify people into groups as most likely to least likely to respond to the mailing. For the most part, this kind of business is unregulated. However, legislators introduced some 8500 privacy bills in state legislatures last year. In addition to companies like Acx iom, there are Web sites that sell reports contai ning personal data, some of which comes from credit reports. The technology makes it possible to gather and process huge volumes of information about individu als. We have to decide to what extent this in formation should be available and balance that against our right to privacy.
251
252
PART THREE: I N FORMATION TECHNOLOGY
CHAPTER SUMMARY 1. Organizations keep a tremendous amount of material in machine-readable
2.
3. 4.
5.
6. 7. 8.
9.
10. 11.
form stored as files on a computer. This trend will continue as firms move away from the use of paper for records. Data in files are stored in records. The most common form is a fixed length record consisting of fields. Each field contains a group of characters that rep resent a value for the field, for example, a social security number. Direct access files are stored on disks with average access times in the range of 8 to 15 milliseconds. A pointer is a number, stored in a field, which directs a program to another record. Pointers are also used to allow a user to follow a logical connection among a variety of computer systems on a network. The database management system automates the tasks of setting up a data base. It facilitates defining records and relationships among them, and it han dles the updating and retrieval of data from the database. The relational model in which data are stored in tables or relations is the dom inant type of DBMS today. Normalization is an important part of the design of a relational database. A key part of the systems analysis and design process is defining data re quirements. Entity-relationship models are one way to describe data and relationships. SQL is an intermediate language that may serve as a bridge among different DBMSs. You can use one of a number of PC DBMS to develop quite sophisticated ap plications for yourself and others to use. Data warehouses facilitate on-line analytical processing, an analysis that helps management better understand its business and contributes to becoming a learning organization.
IMPLICATIONS FOR MANAGEMENT
The ability to store and retrieve vast amounts of data is one of the things that makes a computer so useful in business. While it will probably never happen, one great dream in the industry is to replace paper with data stored in machine read able form on a computer. Database technology is what lets American Airlines keep track of millions of reservations. This same technology lets a credit card firm cus tom tailor promotions to customers who have a history of purchasing a particular product. A university database keeps track of your progress in school, recording the courses you have taken, the number of credits earned, and your grades. You can also use a DBMS on a PC to develop useful applications in your own work. Database is a key technology. You will encounter it in all the functional areas of business including marketing, accounting, manufacturing, and personnel. Data bases, in combination with communications networks, are responsible for much of the appeal of the Internet and World Wide Web, discussed in Chapter 12.
CHAPTER 10: DATABASE MANAGEMENT
KEY WORDS
Address Chained file Character Database administrator (DBA) Database management systems (DBMS) Data mining Data warehouse Entity-relationship (ER) diagram Field File From clause Join Key Knowledge discovery Linked list Logical view Multidimensional database Normalization Object-oriented database On-line analytical processing (OLAP) Pointer Record Relation Relational file Select clause Structured query language (SQL) Where clause RECOMMENDED READING Embley, D. Object Database Development: Concepts and Principles. New York: Addison Wesley, 1997. (A detailed introduction to object-oriented database technologies.) Hernandez, M. Database Design for Mere Mortals: A Hands-On Guide to Relational Database Design. New York: Addison-Wesley, 1997. (A very practical reference ex plaining the core concepts of design theory without technical jargon.) Kent, W. "A Simple Guide to Five Normal Forms in Relational Database Theory," Com munications of the ACM. 26, no. 2 (February 1983), pp. 1 20-125. (A clear article on normalization.) Mattison, R. Database Management Systems Handbook. 2nd ed. New York: McGraw-Hill, 1997. (This handbook provides an excellent coverage on database technology, design, and architecture, including object-oriented databases.) Parent, c.; and S. Spaccapietra. "Issues and Approaches of Database Integration," Commu nications of the ACM. 4 1 , no. 5 (May 1998), pp. 166-178. (An excellent paper explor ing the issue of integrating different databases.)
253
254
PART THREE: I N FORMATION TECHNOLOGY
Post, G. Database Management Systems: Designing and Building Business Applications. New York: McGraw-Hill, 1998. (A useful manual for database modeling and design with numerous business applications.) Silberschatz, A.; Korth, H.; and S. Sudershan. Database System Concepts. 3rd ed. New York: McGraw Hill, 1998. (A complete database textbook that covers everything from the basic to the complex and provides theoretical underpinnings and practical implications.)
DISCUSSION QUESTIONS 1.
Why do users have different logical views of their data requirements? is direct access so much more flexible than sequential access? 3 . How does a DBMS tend to make data and programs more independent? Can programs and data ever be totally independent? 4. What is OLAP? How does it contribute to the organization? 5. Why do most organizations use a DBMS for specific applications rather than attempt to define a comprehensive database for all applications? 6. How does a DBMS make it easier to alter the structure of a database? 7. Does a DBMS completely isolate the user from the underlying structure of the data? 8. Why does a relational database need to be normalized? 9. Why might you want a DBMS on your PC that could also communicate with a larger computer database? 10. What complications are added to a DBMS when distributed processing is involved? 11. What kind of security and controls are needed in a DBMS? 12. In an on-line environment, a common problem is to lock out access to a record while it is updated. Why do you think this is necessary? 13. Recovery from a computer failure or other interruption of a system is a major consider ation for organizations. What problems do you see in recovering from such a failure when using a DBMS? 14. How should one back up a database used for on-line processing? 15. How can accessing data in relational tables be speeded over a straight sequential search? 16. What evaluation criteria would you recommend be applied to a decision of what data base management system to acquire? 17. Why is there a need for a database administrator in an organization using a DBMS? 18. How can the systems analyst use the facilities of a DBMS during the design process for a new system? 19. To what extent is performance (in terms of speed of access) a major consideration in database design? 20. In the schema of Figure 10- 1 1 , how would an adviser query the system to determine the major for a given student? How would the query language access the database? 21. Under what conditions is it better to program a retrieval option into a system, as op posed to providing a user with a general-purpose query language? 22. Are there any conditions under which it would be desirable to duplicate data in a data base? If so, what are they? 23. Think of an application like student registration, and design a relational database for the registrar. 24. Under what conditions might an organization want to have more than one vendor' s DBMS? What problems do you foresee if there are multiple database systems? 25. Why has the relational model come to dominate the DBMS market for personal computers? 2. Why
CHAPTER 1 0 : DATABASE MANAGEMENT
26. What
major trends in technology make database management systems feasible? What do they contribute to information technology, themselves? 27. What considerations apply to the decision of whether a DBMS is on a server or on client computers? 28. Does using a DBMS from a particular vendor mean that the organization is tied to that vendor for the foreseeable future?
CHAPTER 1 0 PROJECT
Data base ASSignment , Part I In addition to a spreadsheet package, a database management system offers a lot of assistance for a firm like Simon Marshall. The first application Mary thought was appropriate for the database package was tracking the inventory of stock the firm has in safekeeping for customers. She explained, "A lot of our clients don't want to leave their stocks with a broker age firm. The brokers sometimes loan the stocks and do other things with them that make our clients nervous. We can't store stocks here, so we have a safekeeping agree ment with the bank. Our records aren't too good, and I think putting them on the computer would help us be more disciplined about keeping track of this information." The problem below involves using a database to solve the inventory problem for Simon Marshall.
I nventory Simon Marshall keeps an inventory of securities for certain customers. Currently, the securities are actually kept by a bank, but Simon Marshall has been concerned about its ability to audit the securities maintained in the bank's vault. Simon Marshall has asked you to develop a simple inventory system to keep track of its holdings with the bank. The following are the fields in the relation and the data for input: Name
John Doe Mary Roe Karl Anderson Sam Smith Sally Jones Howard Cannon Roger Roberts Karyn Hanson Terry Bradley Margaret Smith
Stock ATT OM RM IBM NAB EXX BSL ATT OM NJT
No. shares
100 200 1 50 200 1 50 90 175 125 85 100
Date 9/9/95
10/14/89 1 1121/96 1/1/97 6/6/90 1/19/92 7/8/96 9/1/94 1/15/95 9/4/91
255
256
PART THREE: I N FORMATION TECHNOLOGY
You have been asked to: • Set up a relation in a DBMS to maintain these data. Be sure to enter the date as a date field. • Input the data above. • List the relation after you have entered the data. • Retrieve and list all investors who have more than 1 25 shares of stock in safekeeping. • List all investors who put stock into safekeeping after February 1, 1990. • List all investors who put more than 100 shares into safekeeping in 1 990.
Database ASSignment, Part II Over time, John and Mary, principals of Simon Marshall, would like to keep each customer's portfolio on the computer. "We recognize that it will take a long time to get everything on the machine, but once we have done it, we can price out the portfolio in an instant and give really good information to our clients," Mary com mented one day. You are assigned to set up a prototype for the portfolio application. The basic design strategy is to have two relations, one containing information about the se curity in the Company relation and the other containing the contents of a portfolio in the Portfolio relation. U sing two relations gets around a number of updating and data redundancy problems that are the reasons for normalizing a relational database. Since a portfo lio is likely to contain multiple positions in a given stock, it is wasteful to carry all the data about that stock with each position. (Multiple positions exist each time the stock is bought because each purchase will probably be made at a different price. For tax and accounting purposes, each purchase must be recorded separately.) By joining the relation containing stock data with the relation containing the portfolio, we can compute the current value of the portfolio. Such an exercise is part of your assignment.
Portfo l i o Status Simon Marshall has asked you to help design a simple system to keep track of a stock portfolio using a database management system on a Pc. You will need two relations, one to hold information about each company and the other to keep data about an individual's holdings. (It would be redundant to keep all of the data about a stock with each position a user might have in that stock.) The first relation, Company, contains the name of the firm, its location, line of business, and the current price of its stock. The second relation, Portfolio, contains the name of the firm, a lot number to identify each stock purchase, the number of shares bought of that lot, and the total purchase price of the lot. 1. Print all of the records of each relation. 2. Using the Portfolio relation, print a report of only GM shares.
CHAPTER 1 0 : DATABASE MANAGEMENT
3. Use the Company relation and sort the firms into sequence by location. Dis play and print the results. Do the same to sort the relation into order by type of business. 4. Join the two relations together. 5. Print a report using the DBMS report-creation option to show net position on each stock and for the entire portfolio.
Company Relation Company AT&T
GM IBM TWA
State New Jersey Detroit
New York Kansas
Business Communications
Manufacturing Electronics Airline
Share price 22.78
52.45 178.54 45.80
Portfo l i o Re lation Company AT&T AT&T IBM IBM TWA GM GM GM
Number
Shares
Purchase price
12345 54321 88888 44444 11111 12121 34343 56565
50 100 60 100 50 75 1 50 100
1 ,200.00 2,100.00 10, 100.00 1 8,000.00 3,000.00 3,750.00 8,000.00 5,000.00
257
CHAPTER 1 1 III
I
Outline Communications between Computers
Codes Transmission Modes Direction of Transmission How Are Signals Represented? Speed of Transmission What Is a Protocol? Summary Networks
Network Configurations Local Area Networks TCP/IP: A Network Protocol Going Wireless Voice Considerations The Advantages of Networks for Business
What Are the Alternatives for Wide Area Communications? Why Develop Private Networks? Worries about Network Security The Contribution of Commnnications
Electronic Mail as a Communications Tool Electronic Data Interchange
258
CHAPTER 1 1 : COMMUNICATIONS
Beyond the Model T Building an Electronic Market Transforming Organizations and the Economy
Focus on Change
The communications industry is responsible for some of the most extensive tech nological changes affecting organizations. Extensive deregulation through the Telecommunications Act of 1 996 has led to alliances and mergers among the major communications firms. Long distance carriers are buying cable companies to give them access to local subscribers. The local phone companies are trying to enter the long distance business. These changes provide alternative sources for service and lower communications costs. Communications technology makes it possible to share data within the company and with external organizations. It facil itates coordination and helps management define new organizational structures as it removes constraints on the time and place for work and makes possible the cre ation of new structures that cut across traditional lines on the organization chart. As you read about the companies in this chapter, think about how communications technology is changing the nature of work and relationships with customers . •
Early computers processed data in batches with intervals of days or months be tween runs. Devices were soon developed to transmit data on punched cards from one location to another over telephone lines, marking the beginning of the communication of data through an existing telecommunications network. The operation took place off-line, and the computers involved were not directly connected to the telephone lines. In addition to card punches that could send and receive, there were devices for sending the contents of files on magnetic tapes from one location to another. In the early 1960s, the first on-line systems were developed. These computers, used for airline reservations, served many terminals connected through various types of communications lines. (A few years earlier, the first such on-line systems had been developed for defense applications.) At about the same time, terminals were attached to computers used for time-sharing. The major difference between on-line and time-sharing systems is that the former are dedicated to a single appli cation. For example, an airline reservation agent can only make a reservation or inquire about the status of various flights. The agent cannot write a program from the terminal. With time-sharing, the user of the terminal usually does have the ability to write programs. The use of on-line systems has expanded rapidly. Today most new systems have some portion that is on-line, such as data entry, update, and/or inquiry. At the same time, there has been an expansion in the number of alternatives available for estab lishing communications among computer devices. Users can choose from dial-up phone service all the way to private networks using satellites for transmission. In this chapter we cover the fundamentals of data communications. First we look at a basic model of communications between computing devices. The basics
259
260
PART THREE: I N FORMATION TECHNOLOGY
provide the foundation for understanding networks. Organizations are rapidly building and interconnecting networks of computers and other devices. The chap ter discusses how a firm can obtain network services from common carriers or from building a private network. We also discuss some of the software required for communications-intensive applications. Several applications that depend on telecommunications, such as e-mail and electric data interchange (EDI), illustrate how this technology contributes to the organization. The need for standards in the communications industry has been apparent for many years. How could you place a direct dialed call to someone in a European or Asian country if the various telephone companies involved in the call had not agreed on standards? There are a number of groups, both domestic and interna tional, that work on developing standards for new types of communications. While standards are important in a variety of endeavors, they are mandatory for success ful telecommunications. COMMUNICATIONS BETWEEN COMPUTERS
Figure 1 1- 1 is a diagram of high-level data communications between two com puter devices. We shall expand this basic schematic further. The most familiar type of communications is probably the case in which device 1 is a PC and device 2 is a server of some type. The transmission line may be nothing more complex than a pair of twisted wires from the terminal leading to a central computer that offers time-sharing services. Figure 1 1 -1 describes the process. Codes
The data sent over the line are represented as some type of code; that is, the sending and receiving ends of the communications lines have to agree on how to represent symbols such as the letters a, b, c, etc. The most frequent code for interchanging data is called ASCII (American Standard Code for Information Interchange), which is a 7-bit code (there is an eighth bit for error checking) and thus has 128 symbols. A code used with earlier computers was BCD (binary coded decimal), a 6-bit code. Fi nally, there is a code that is primarily used by IBM mainframes known as EBCDIC (extended binary coded decimal interchange code), which is an 8-bit code.
FIGURE 1 1 ·1
High-level data communications.
CHAPTER 1 1 : COMMUNICATIONS
All codes, then, use sequences of O's and 1 's to represent different symbols. As an example, the ASCII code for H is 100 1000. On the sending end, an H is trans lated into 1001000 for transmission. On the receiving end, the string of bits is trans lated back into an H. (It should be noted that computers are designed to represent data in memory in coded form. However, there is no required relationship between the internal coding and the codes used for transmission between computers.) Codes often feature extra bits or characters that are used to control transmission and to detect errors. A simple transmission scheme that sends one letter at a time might include a start bit and a stop bit to delimit the beginning and end of the character for the receiving station. A basic error-detection scheme is parity check ing: The sending device checks that there is an odd number of bits in each charac ter; if there is an even number, the sending station makes the parity bit a 1 , creat ing an odd number. Under this odd-parity scheme, the receiving device also counts the bits. If there is an even number, at least one bit has been lost in transmission. The parity scheme is rather simple. There are far more elaborate error-detecting and even error-correcting codes available. Transmission Modes
There are a number of options for transmitting data over communications lines. The most frequently used approaches are the following: • Character mode. In character mode, data are transmitted as single characters as they are typed on a terminal. This technique is very simple and does not require complicated hardware or software. • Block mode. In block mode, data are placed temporarily in a hardware memory on the sending device. The block is surrounded by appropriate characters indi cating the start and end of transmission. The data are then transmitted as a single block, usually with some type of error-checking sequence at the end of the block. If there are errors, the two nodes arrange for a retransmission of the data. • Asynchronous mode. Asynchronous transmission is associated with character mode operations, since the characters are sent when entered. A single bit is added to the front of each character, and one or more bits are added at the end. These extra bits alert the receiving device to the existence of the character and delimit it. • Synchronous mode. Block transmission features blocks of equal length, one fol lowing another. In synchronous mode, there is no need for the start and stop bits that are associated with each character in asynchronous transmission, saving considerable overhead when in the block mode. The beginning of each block is identified, and the sending and receiving devices must be synchronized. This synchronization is maintained by a clocking signal, and this synchronization is in force whether any data are being sent or not. Direction of Transmission
There are several ways to send data over lines. In simplex transmission, the data are sent in one direction only, but this approach is rare. Using half duplex trans mission, data travel in two directions but not at the same time. With full duplex
261
262
PART THREE: INFORMATION TECHNOLOGY
FIGURE 1 1 ·2
Digital and analog signals.
FIGURE 1 1 ·3
Modulation and demodulation.
transmission, data are transmitted simultaneously in both directions. Note that this approach generally requires two lines since the same data path cannot carry signals in two directions at the same time. How Are Signals Represented?
There are two basic ways to represent signals: analog and digital. These signals are shown in Figure 1 1-2. Analog Signals Analog signals are used because the first data transmission took place over voice telephone lines, originally developed to carry analog signals. Be cause computer devices communicate in digital form, the digital signal must be converted to an analog signal (modulated) for transmission and then changed to digits (demodulated) at the receiving end. As shown in Figure 1 1-3, a device called a modem converts the digital code into an analog signal. Figure 1 1-4 shows one approach to this modulation task. In the figure, we see encoding done using amplitude modulation. The analog signal is continuous and has the form of a sine wave. By using different amplitudes (heights of the sine
CHAPTER 1 1 : COMMUNICATIONS
FIGURE
1 1 ·4
Amplitude modulation.
wave) to represent a 0 and a I , the digital data can be encoded for transmission over analog lines. The modem is the device that accomplishes this modulation. It is possible to modulate a signal using the amplitude of the sine wave as described above, varying the frequency of the wave or changing the phase of the sine wave to encode a 0 or a 1 . Your personal computer probably has a modem that operates at up to 56 Kbits per second over a dial-up phone line. Using this modem, you can connect to a variety of computers, though it is unlikely you will actually commu nicate at the modem's maximum speed due to the limitations of the local line to your telephone. Digital Signals Because of the explosion in data transmission over the past two decades, and for greater efficiency, telephone companies and private communica tions carriers have developed digital transmission networks. If the entire circuit from end-to-end is digital, there is no need for a modem. The only requirement is some kind of a line interface device to connect the sending or receiving unit with the transmission line. Thus, even with digital transmission, we still need to convert analog signals to digital form. A communications carrier might provide a digital link between telephone central offices, while the "local loop" to a home or office goes on an analog copper circuit. There is also great interest in digitizing some analog sig nals so information, such as video-conferencing, multimedia, and home video, can be compressed and sent over relatively low-speed lines. The analog signals from a video camera can be digitized and then compressed so the large number of bits required will "fit" on a line. Compression involves using some type of algorithm to take out redundant information by coding it. A compression algo rithm might look for a pattern in an image that is all dark. It would substitute a code for the number of black elements rather than transmitting all the black bytes. At the receiving end, equipment would generate the black elements that were not transmitted.
263
264
PART THREE: INFORMATION TECHNOLOGY
FIGURE 1 1 ·5
Analog-to-digital transformation using pulse code modulation.
Figure 1 1-5 shows how it is possible to digitize an analog wave using pulse code modulation (PCM). The Y axis on the waveform is divided into a series of intervals. If we are using a 7-bit code, we would make 27 or 128 intervals. One unique 7-bit pattern is assigned to each interval. If we view the Y axis as a window through which the wave passes over time, at a particular instant or sampling point, we would note the interval the wave touches at our window. Then we would send the 7 -bit pattern that has been assigned to that interval as a digital representation of the wave. We would take another measurement at the beginning of the next sampling interval. Thus, the digital signal consists of a series of 7-bit characters, each of which encodes part of the waveform. To provide an adequate representa tion of the wave, we might sample 8000 times per second. With this interval, we generate 7 bits x 8000 samples/second = 56,000 bits/second as the amount of data sent over the line. It should be clear now why analog data, like full-motion video, require very high capacity lines (the higher the capacity or speed, the higher the bandwidth of the line). Speed of Transmission
Transmission can occur at different speeds. The communications specialist uses a measure of speed called a baud, which is the number of times per second that the signal changes. For our purposes, it is easier to think in terms of bits per second or characters (bytes) per second. Subvoice-grade lines transmit 45 to 1 50 bits/second,
CHAPTER 1 1 : COMMUNICATIONS
TABLE 1 1 ·1 TRANSMISSION SPEEDS For a network
For home
PC Modem ISDN ADSL Cable modem DirecPC Satellite Wireless
bps
=
bits per second, K
56 Kbps 64 or 1 28 Kbps 44 Kbps to 8 Mbps 384 Kbps to 4 Mbps 400 Kbps Up to 4 Mbps home, 1 ,555 Mbps business =
thousand, M
=
million, G
=
Voice grade T1 1ine T3 1ine DS3 1ine OC3 connection OC1 2 connection
56 Kbps 1 .544 Mbps 45 Mbps 45 Mbps 1 55 Mbps 622 Mbps
OC48 connection
2.45 Gbps
billon
whereas voice-grade lines transmit a maximum at 56 Kbit/second only if you are using a modem that can compress the data. Digital transmission is popular because it is very reliable, offers high speeds, and eliminates the need for modems. Table 1 1-1 describes communications alternatives and speeds for home and for networks, which are discussed in the next section. * What Is a Protocol?
Transmission involves protocols, which are sets of rules and procedures to control the flow of data between points. Both the sending and receiving stations need to follow the same procedures. For example, if blocks are being sent, both stations must agree that the transmission is to be in block mode. A protocol can also in crease the efficiency of transmission by reducing the amount of data that must be sent for control purposes. We must control the following: • • • •
Setting up a session Establishing a path from nodes 1 to n Linking devices together The hardware sending and interpreting the data Protocols are also used to handle the following:
• • • •
Detection and correction of errors Formatting Line control Message sequencing
*In this text, Kbits/second, Mbits/second, and Gbits/second equal I billion bits/second, respectively.
and
1000 bits/second, I million bits/second,
265
266
PART THREE: INFORMATION TECHNOLOGY
The International Standards Organization (ISO) has suggested a layered archi tecture to facilitate communications among different types of equipment. The seven logical layers are as follows (the numbering follows the ISO designation of levels); 7. Application. The window through which applications gain access to the ser
vices provided by the model. 6. Presentation. Services here are concerned with data transformation, format
ting, and syntax. 5. Session. A set of rules to set up and terminate data streams between network nodes. 4. Transport. These rules guarantee that the transfer of information occurs cor rectly after a route is established throughout the network. 3. Network. Rules for arranging a logical connection between a source and desti nation on the network based on available data paths in the network. 2. Data link. Rules that describe how a device accesses the medium in the physi cal layer and identifies data formats, procedures to correct transmission errors, and so on. 1. Physical. The lowest level in the model consists of a set of rules to specify the electrical and physical connection between devices. The highest levels should remain similar for different equipment, whereas lower levels depend more on the devices and manufacturers involved. Summary
A device sends out a code, such as ASCII letters, to some type of interface, which sends the message over a transmission line. For analog transmission, the interface is a modem, which transmits either characters or blocks of data. At the receiving end, the interface unit must reconvert the code into the appropriate code for pro cessing the transmitted data (see Figure 1 1-6). NETWORKS
A network connects a variety of computers and other devices. Table 1 1 -2 describes the networks discussed in this chapter. The largest computer network is the Internet, which we shall discuss in some detail in the next chapter. The largest general-purpose network in the world is the public switched network used to carry most voice traffic around the world. Here, one simply dials a number and establishes a point-to-point connection only when it is needed. You probably use this network if you connect to a university computer using a personal computer with a modem. In addition to telephone, there are spe cial private network services also providing switched connections. Such a network covers a huge distance and would be considered a wide area network (WAN). Some organizations want a network that is local to a given area, and they might configure it using private lines. This kind of network is known as a metropolitan area network (MAN).
CHAPTER 1 1 : COMMUNICATIONS
FIGURE
1 1 ·6
Some communications options.
TABLE 1 1 ·2 TYPES OF NETWORKS AND EXAMPLES
Type of network
Example
Network of networks Public switched network Wide area network (WAN) Metropolitan area network (MAN) Local area network (LAN)
The Internet Voice telephony The phone system A campus network PC network within a building
In place of a switched network, you could make a simple direct connection be tween a computer and a terminal using twisted-pair cables running directly be tween the two devices. You can generally wire directly for a mile or two before the loss of signal (attenuation) becomes too great and modems are needed. One way to reduce line costs is to have several terminals connected to a de vice called a multiplexer. The multiplexer combines the signals from various low-speed terminals and sends them over a higher-speed line. In time division
267
268
PART THREE: I N FORMATION TECHNOLOGY
multiplexing, the device samples separate incoming signals and combines them on the output line. At the receiving end, the signals must be demultiplexed. With a multiplexer, the speed of the output line must equal the sum of the speeds of the input lines. A concentrator is a hardware device that collects messages from terminals and stores them if necessary. The concentrator sends the messages over a higher-speed line to the computer. Unlike the multiplexer, however, it can temporarily store the data, so the capacity of the high-speed line does not have to equal the sum of the capacities of the low-speed lines it serves. There are also network devices called bridges and routers, which we discuss later in the chapter along with local area networks. Network Configurations
Given the various communications options, you can configure a network of com puters and terminal devices in any number of ways. Figure 1 1-7 presents some popular options. In a hierarchical scheme, one computer controls a series of subor dinate computers. An example of this approach might be a central computer con trolling local grocery store computers, which in tum control point-of-sale termi nals at checkout stands. The star connection is similar, but here a single host or server can communicate with each remote processor. The local computers commu nicate with each other through the central system. In a ring or loop scheme, all processors can communicate with their immediate neighbors. This pattern can be extended to allow communications from any FIGURE 1 1 ·7
Examples of computer-to-computer connections.
CHAPTER 1 1 : COMMUNICATIONS
processor to any other processor. The bus typology features a communications bus connecting individual computers. Computers put messages containing the address of their destination on the bus for delivery. Local Area Networks
The first people to buy personal computers used them as stand-alone devices. In so doing, they bought freedom and independence from the professional information services staff. Soon, however, users found it advantageous to share devices such as laser printers. The most common way to share devices, data, and programs is through a local area network (LAN). The local area network is an approach for connecting various devices that need to communicate with each other and that are grouped closely together, as in a single building. There are two major architectures for LANs (see Figure 1 1-8). The first is a peer-to-peer network in which all PCs are connected to each other. Data on the network are passed from one PC to the next. As a user, you must devote some of the resources of your workstation to accepting and passing data on the network. Each computer on the LAN incurs this type of overhead. Peer-to-peer LANs are relatively inexpensive and represent an attractive alternative for a small network. This kind of network is sometimes called a "zero-slot LAN" because there is no need for a circuit card, taking up a slot in the computer, to connect to the network. The second type of LAN is more popular and employs a file server. The server is a computer that responds to requests from its clients or user PCs. A client might request that a job be printed on a single laser printer that serves a LAN with 1 0 PCs. The server puts the client's print job in a queue and prints it when
FIGURE 1 1 ·8
(a) Peer-ta-peer LAN. (b) Client-seNer LAN.
269
270
PART THREE: INFORMATION TECHNOLOGY
the printer is free. If the client asks for a software program or data, the server pro vides it. The LAN is generally installed for a group of users who need to share something-a database, computer equipment, and/or software. This LAN is more complex than the peer-to-peer network and is usually more expensive. It does free the client workstation from performing any LAN functions for other users. A wiring hub is frequently used to configure a network in a building. All the computers on the floor of the building where my office is located are connected by copper wires to a wiring closet on the floor. This closet contains a hub and the lines from individual computers plug into the hub. The hubs on various floors are connected with file servers using fiber-optic lines. Ethernet The most popular local area network protocol today is Ethernet. In contrast to the peer-to-peer LAN, a computer connected to an Ethernet LAN must have a network interface card (NIC), usually called an Ethernet card. Such a card is standard equipment on Dell's Optiplex series of computers, which are mar keted to organizations. Ethernet cards are also available for the PCMCIA slots of notebook computers, so that you can plug your portable computer into a LAN. At a low level, the LAN must transmit data over the network. How is transmis sion coordinated so every workstation does not try to send data at the same time and thus block the data from other PCs? One solution to this contentious problem is called carrier sense-multiple access with collision detection (CSMAlCD). The transmitting station checks whether a channel is clear by listening for a carrier sig-
CHAPTER 1 1 : COMMUNICATIONS
nal. If the net is busy, the station waits until it is clear and then sends a message while listening for collisions with other stations that might have started to send at the same time. If a collision is detected, the station stops sending and waits a ran dom time interval before starting to send again. Ethernet is the best example of a CSMAlCD protocol. The fastest version of Ethernet, called gigabit Ethernet, promises speeds from 200 Mbits/second to the full 1 Gbits/second. Networks use gigabit Ethernet to connect switches or to link to high-speed servers. This technology is for the back bone of a network and not for communications with the computer on a desktop! There are now an estimated 100 million Ethernet ports worldwide, so this technol ogy is rapidly becoming a standard. As you might expect, LANs grew in organizations without a lot of planning. Different departments and even different floors in buildings have their own LANs. Sometimes these LANs use different standards: One might use Appletalk and serve Macintosh computers while another features an IBM PC standard called token ring architecture. Sooner or later, users on these networks want to be con nected to each other. The solution is to use a bridge or a router. A bridge has very little logic; it connects similar networks. A router contains logic and serves as the interface between two or more networks and possibly a wide area network. Routers have enough logic to select the best path between two nodes on a net work. A multiprotocol router is able to process messages from networks that fol low different protocols. A bridge or a router can be used to connect hubs on differ ent floors of a building or in remote locations. And hubs are continuously becoming "smarter." An organization might route all the wires from the local wiring hub to an intelligent hub. This smart hub contains bridges and routers, and is controlled by software, since the hub itself is a computer. TCP/IP: A Network Protocol
One of the best known protocols is Transmission Control Protocol (TCP)I In ternet Protocol (IP) developed by a Department of Defense research project to connect various kinds of networks, discussed in the next section, to form an Inter net. (The Internet, itself, is discussed in the next chapter.) The Defense Depart ment was faced with a variety of military computers and networks all produced by different contractors, generally the lowest bidder! It had two objectives: first to create a protocol to allow all its networks to be interconnected, and second to cre ate a network (of networks) able to carry on if some component or subnetwork could not operate due to failure or destruction. The IP part of the protocol is responsible for moving packets of data from node to node in a network. IP forwards each packet based on a four-byte destination number or IP address. (A computer connected to the Internet must have an IP ad dress.) Gateways and servers move data among departments and around the world. IP operates on these computers. TCP is responsible for verifying the correct deliv ery of data from a client computer to a server and must see that data are not lost someplace on a network. TCP adds support to detect errors or missing data and to generate a retransmission until all the data have been correctly received.
271
272
PART THREE: INFORMATION TECHNOLOGY
Because the Internet is a packet-switched network, when you connect to an In ternet service provider (ISP), the communications software must use the TCP/IP protocol. Yet another protocol for use over serial communications lines like the telephone is PPP or point-to-point protocol. This protocol actually transmits a variety of network protocols over a number of different types of lines. Going Wireless
Setting up a network with cables and wires is not always desirable or feasible. Wireless technology uses some kind of broadcast to eliminate the need for cabling. Wireless modems are available for local area network applications; they are gener ally limited to short distances within a building. The most obvious wireless option for wide area communications is the cellular phone network. Cellular digital packet data (CDPD) uses cellular frequencies to transfer digital data as a packet. This technology is in use today and is adequate for messages. The bandwidth is too low, however, for transmitting graphics and video. Another option is to use a system of low-orbit satellites like Iridium or Teledesic. These two systems employ large numbers of satellites (66 or more) in a low orbit. The sending station sends data to a satellite that forwards it through other satellites until it reaches the receiving station. The advantage of a low orbit
The idyllic view of the American farmer using a tractor and plow to produce a bountiful harvest is not quite complete. Farmers on the leading edge use Geographical Position System (GPS) satellite navigation to map and analyze fields, telling the farmers where to apply the proper amounts of seeds, fertil izer, and herbicides. One equipment dealer indicated that he had sold 14 combines in a year, and 1 1 of them were equipped with GPS receivers. He is also retrofitting older combines as the technology spreads, though only about 5 per cent of American farmers now use it. G PS units and their associated computer monitors start at about $6500. In the past farmers managed their busi ness on a per-field basis; now they can mi cromanage. One Illinois farmer found that parts of his fields did not need any fertilizer at all after monitoring the soil. Less fertil izer lowers costs and reduces pollution
from the runoff of water from the fields. A typical appl ication is to use geographic fixes from the G P S and a computerized counter to record how much grain is being harvested each second from each meter of the field. Then the farmer downloads this i nformation i nto a p e rs o n a l c o m p u t e r , which produces a contour map that shows variations of, say, more than 60 bushels an acre. Cross-referencing this information to other variables, like characteristics of the s o i l , allows the farm e r to analyze why some land is less productive. The farmer com b i n es these data with G P S naviga tional fixes to precisely apply herbicides or fertilizer only where it is really needed. Innovators constantly take advantage of new opportunities provided by technology. I n this instance, equipment manufacturers are combining a navigational system first devel oped for the U.S. Navy with information tech nology to improve productivity in agriculture.
CHAPTER 1 1 : COMMUNICATIONS
is reduced power consumption, allowing for a smaller handset than the traditional satellite phone. Iridium has relatively low bandwidth, but Teledesic with its 288 satellites can handle up to transmission speeds of 1 55 megabit/second. For more details, see Varshney ( 1999). A retailer might want to use a wireless terminal to keep track of inventory. A trucking firm could use a wireless system to send messages to its trucks and deter mine where they are at any time. K Mart stores use wireless technology to provide up-to-date information on the sales floor. A clerk carries a terminal that looks like a laser gun. The terminal connects with backroom computers using low-power radio frequencies. When the clerk scans an item on the shelf with the laser gun, he or she can read on the gun's display screen whether the item is on order and when it is ex pected to arrive. K Mart claims this system has doubled inventory turns per year. United Parcel Service began a systems modernization program in 1986 to allow it to compete with Federal Express in the overnight-delivery market. By 199 1 , UPS invested $ 1 .5 billion to develop its technological infrastructure. The effort included a global data network for $50 million, a $ 100-million data center in New Jersey, electronic tablets for drivers ($350 million), and $ 1 50 million for a cellular net work. The company now has nearly 2000 IS employees, 5 mainframes, 300 minis, and about 33,000 PCs. There are also 1 500 LANs and 69,000 hand-held computers. The company has planned to spend another $3 billion on technology to expand the capabilities of its systems. UPS has equipped its trucks with terminals that send data over the cellular phone system. This approach allows it to track deliveries for all air and some ground parcels during the day. In the past, that information was collected in batch mode and used to update centralized computers at night. The data were not avail able for inquiry until the next day. When drivers collect a package, they capture delivery information, including a signature, using a hand-held pen-based computer. This computer fits into an adapter in the truck containing a cellular modem which sends data to a switch in a cellular network. The switch places the data from the truck on the UPS private net work known as UPSnet to be sent to the UPS mainframe database in New Jersey. American Airlines is also joining the ranks of companies using wireless tech nology for communications. Wireless notebook and subnotebook computers allow passenger agents to roam airports, providing passengers with faster check-in. The system provided by McCaw Cellular Communications, an AT&T subsidiary, pro vides access to the SABRE database of passenger reservations. The agent is able to offer many of the same services as agents behind counters using fixed terminals. American sees the system expanding to personnel on the tarmac using devices to report maintenance and departure times. Using one of several wireless networks that offer services in major cities, you can send e-mail messages from your notebook computer without having a phone nearby. A columnist for a computer magazine recently described how she used her notebook computer on an airline flight to compose and store a variety of e-mail messages. On leaving the plane, she had her computer broadcast the messages to a wireless network for delivery.
273
274
PART THREE: INFORMATION TECHNOLOGY
Finally, Hewlett-Packard developed a wireless mobile unit that lets doctors receive a patient's vital signs for remote diagnosis. The unit is capable of receiving electro cardiograms as well as other vital signs. The system features a $25,000 dispatch sys tem that is linked to medical monitors and five palmtop computers. During testing, the system is credited with saving the life of one patient when information about his irregular heartbeat was sent to his doctor in her car. She returned to the hospital while the nurse prepared the patient for treatment, saving a great deal of time. Voice Considerations
The designing of a communications network must consider both voice and data transmissions. We measure data transmission in terms of bits per second, whereas voice is usually measured in terms of duration of conversation. The communications systems designer uses statistics on call volumes to determine what capacity the net work must have for voice transmission. These calculations are added to the require ments for data transmission to arrive at an overall specification for the network. There have been a number of innovations in voice communications-the most signif icant one in the last decade is cellular phones, both analog and more recently, digital. Originally portable phones worked in a large area, and the number of phones was limited by the frequencies available for this service. A cellular network di vides its coverage area into a series of small cells, and each cell has an antenna for receiving and sending data in each cell. Because the cells are small, cellular phones transmit at low power and their signals do not travel far beyond the local cell. As a result, the system can reuse frequencies in different cells, greatly multi plying the capacity of the system. Computers monitor the location of callers based on signal strength from their phones and "hand off' a call to a new cell when the caller moves into that cell. Personal communications systems (PCS) feature digital transmission using a different frequency from cell phones, but the principles are the same. The growth in cellular phones has been dramatic. There are reports of individuals dropping their "land line" phone and using cellular communications exclusively. Developing countries are installing cellular systems because the cost of installation is much less than for a phone system connected by cables. The second recent innovation in voice communications is the use of the Internet for long-distance service. Individuals can purchase software that allows two peo ple to use an Internet connection to communicate via voice. Companies can pur chase devices that act as a gateway for a number of phones; one such gateway sup ports 1 20 ports and transmits the calls over the Internet using Voice over Internet Protocol (VoIP). The advantage of Internet telephony is lower cost; one only pays for an Internet connection, not time and distance charges for each call. The disad vantage is that the quality of communications is not as good as with traditional phone service. THE ADVANTAGES OF NETWORKS FOR BUSINESS
There are a large number of sources for communications services. As examples, we have discussed the public switched network, in which telephone lines on the
CHAPTER 1 1 : COMMUN ICATIONS
Volvo in G reensboro, N . C . is b u i l d i n g a global network to support truck manufactur ing. AT&T is the contractor for a 200-node frame relay network to connect truck dealer s h i ps . A separate net l i nks more than 30 warehouses and remote sites for other Volvo auto and marine products. One objec tive of the project is to have all data avail able everywhere so that an engineer in Swe den can query U.S. databases. With the help of the network and other IT projects, Volvo plans to boost its tractor-trailer sales from third place internationally to first or second.
T h e network w i l l h e l p e m p l oyees around the world share databases of infor mation on standard modules for trucks that can vary in design for each country. Volvo talked with several different companies and chose AT&T because of its experience and reputatio n . However, the company also uses network services from S p r i n t and Global One. I ncreased competition in com munications has helped Volvo use commu nications and database technology as a part of its strategy for increasing its market share.
local level connect with AT&T, Sprint, or MCI-Worldcom. We can also pay to lease a line or pay according to the time a line is in use. The actual communica tions path may be through land lines, microwave. links, satellites, or some combi nation of the three. A firm may develop a private network and/or use services of fered by common carriers. What Are the Alternatives for Wide Area Communications?
A type of network known as packet switching is now a standard for transmitting digital data. A circuit-switched network establishes a connection between every pair of points that wants to transmit data, just as the telephone network does. There is considerable overhead in making the connection between the two parties. In packet switching, the network does not make connections for individuals. It routes bunches of data called packets, Network hardware and software break data into packets with each packet having an address. Each node on the network looks at the address and determines the best path for sending it on toward its final destination. Network hard ware and software reassemble the packets on the receiving end. Packet switching has proven very popular for transmitting data over large distances. There is an interna tional packet-switching standard called X.25, and a number of networks use this pro tocol, including the French Transpac network (see Figure 1 1-9). Gigabit Ethernet is a high-speed standard for communications. At first gigabit Ethernet will require fiber optic lines, and its use will be confined to the backbone of a LAN. Because some 80 percent of local area networks use Ethernet already, the evolution to a faster version is more appealing than changing to some other communications technology. Eventually gigabit Ethernet should work over twisted pair wires over short distances, making it viable for connecting individual users to a LAN.
275
276
PART THREE: INFORMATION TECHNOLOGY
FIGURE 1 1 -9
Packet switching.
Frame relay is a service offered by some of the common carriers to transmit data for wide area networks. The user chooses a data rate and connects to the common carrier's frame relay system through a router. The common carrier maintains a packet-switched "public" frame relay network, which offers higher speeds than some private network alternatives. This common carrier network also features extensive backup and rerouting capabilities, making a service outage less likely. Speeds with frame relay are lower than with ATM, ranging from 56,000 to 1 ,544 Mbits/second. Another service is switched multimegabit data services (SMDS). Some regional carriers are now offering this type of service in the U.S. as an alternative to build ing a private network for high-speed data transmission. SMDS is a high-speed fast-packet data service with speeds ranging from 1 . 17 to 45 Mbits/second. With this service, there are no connections; it is a true packet-switched network. You
CHAPTER 1 1 : COMMUNICATIONS
We frequently talk about various speeds of transmission in numbers that can be a little hard to relate to as users. The following three types of transmission provide a little better sense of the difference transmission speed ml3ans in terms of sending a message: •
•
Using a 56 Kbps (bits per second) modem to change a digital signal to analog form and send a 1 Mbyte file would require 2.3 minutes if the total transmission occurred at peak speed. Using ISDN, which combines two 64 Kbits/second channels to yield a rate of 1 28 Kbits/second, this megabyte file
•
•
would take 62.5 seconds to transmit at peak speed . Using a cable modem at 1 Mbit/second would take 8 seconds . Using asynchronous transfer mode (ATM) at 1 55 Mbits/second, the megabyte file would take 0.05 seconds to transmit. (ATM speeds range from 50 to 622 Mbits/second.)
Companies with large amounts of data to send are very interested in ATM networks based on this kind of calculation. Many of us would like to have I S D N lines to use for videoconferencing and to access the I nternet
can send data to any other user on the network if you know the recipient's address (and the recipient is willing to accept the data). SMDS is intended for corporate networks and can be used, for example, to integrate high-speed LANs. Various common carriers in Europe, the United States, and elsewhere offer inte gra1ted services digital networks (ISDNs). ISDN services include voice and data transmission, although not at the high speed found on T l circuits. With the right equipment, a pair of traditional copper wires can carry two simultaneous voice or fast-data signals. A third channel on this line is used for messages between the communications equipment. Each of the two digital data channels operates at a speed of 64 Kbits/second while the signaling channel operates at 1 6 Kbits/second. While it has been slow to develop, ISDN offers some real advantages for busi ness and even home use. Using compression algorithms, an ISDN line can obtain acceptable video and video conferencing. A business might use ISDN for a wide area connection between LAN s, something that takes place on an occasional basis. ISDN has been used to transmit high-resolution CAT scans to a consulting physi cian located far from the patient. As the cost for ISDN drops, its use becomes appealing to telecommuters and the home office. An ISDN card in the PC is the only interface needed after a common carrier installs the line. ISDN offers high-speed access to corporate computers; it can access the Internet (see the next chapter) and can be used for multimedia applications. The transmission standards and protocols for ISDNs have been standardized, so eventually the service should be available almost worldwide. ISDN services are a viable alternative for developing a communications network, especially for an organization that does not need extremely high-speed or high-bandwidth communications .
277
278
PART THREE: I N FORMATION TECHNOLOGY
Competing with ISDN is asymmetrical digital subscriber line (ADSL), which offers two rates of transmission depending on the direction. The line is connected to a modem at both ends, and it is possible to send both voice and data over the same twisted pair copper line at the same time. Data coming in move at a higher speed than data going out, which is well-suited when using the Internet. You send a small amount of information to a server and receive a lot of data in return. Data going to the telephone office move at speeds of 1 6 to 640 Kbits/second. Data returning travel at 1 .5 to 9 Mbits/second. There are a number of limitations on ADSL, espe cially distance, and it is not clear how successful it will be at this point. Your local cable TV company is also interested in providing communications, es pecially an Internet connection through a cable modem. Because cable has a great deal of bandwidth, the potential exists for extremely high-speed connections to the Internet. The nominal bandwidth for cable is 27 Mbits/second for data coming to your PC. However, this bandwidth is shared among a group of users, about 25 in most systems. With overhead and limitations on modem speed, the actual band width available to an individual user is on the order of 500 Kbits/second to 1 .5 Mbits/second. However, there are several challenges to be overcome before this approach is feasible. First, cable TV has traditionally been a one-way service: The cable company transmits data to your house, but you do not send much, if any, data back. For Internet access, the cable company must be able to handle meaningful two-way communications; the return path does not have to be as fast as the path to your house, but it has to exist and operate at a reasonable speed. Our local cable company has installed fiber optic lines and offers Internet access for a number of cities. The service is extremely fast and, so far, reliable. The company contracts with @home.com to provide an Internet portal. Because local subscribers share the same cable, the more customers using a cable modem, the slower the response. Asynchronous Transfer Mode (ATM) is a form of packet switching that does not actually use the TCPIIP protocol. Instead, ATM uses cells of fixed length, gen erally 53 bytes. Because cell lengths are uniform, ATM can carry voice, video and data traffic without sacrificing much efficiency. A conversation requiring the car rier to dedicate a 64-Kbps line may only require 1 6 Kbps capacity on a packet switched network, reducing costs and improving service. TCP/IP may send each packet via a separate path while ATM sets up a "virtual circuit" for the duration of a transmission, ensuring that the packets arrive in their original sequence. In 1999, AT&T announced that it would no longer buy traditional telephone switches, but would instead purchase ATM switches. In effect, this announcement marks the end of the circuit-switching era of communications and means that the major commu nications carriers are embracing packet switching. Data Speeds in the Future Bell Laboratories, a part of Lucent Technologies, is at the forefront of research on how to expand the capacity of communications networks. A new technology called wave-length division multiplexing, or WDM, offers the possibility of dramatically faster communications at lower costs. WDM uses light of different colors, all of which are in the invisible infrared spectrum, to carry multiple streams of data. Each color goes from end to end of a glass
CHAPTER 1 1 : COMMUNICATIONS
strand in a fiber optics cable, and each color can carry its own stream of data. Today there are commercial WDM systems available with 40 hues. Lucent has sent data at a rate of one trillion bits per second using WDM in the laboratory. Such capacity would allow Hollywood to deliver movies to theaters in seconds. Speeds are anticipated to reach 200 terabits per second, enough to deliver the contents of the Library of Congress in a second. WDM is especially exciting be cause it uses existing fibers; there is no need to dig up cable. All of the changes take place on the sending and receiving ends of the circuit (Business Week, De cember 7, 1 998). What are the implications if this technology proves to be a commercial suc cess? Imagine having a high-speed connection with anyone in the world for a nominal cost. Companies could be connected at extremely high data rates to all of their suppliers and customers. The possibility of extremely fast, virtually unlimited capacity communications at a nominal cost suggests many exciting applications that will change the way companies do business. Why Develop Private Networks?
In the early days of communications among computers, firms typically designed a network for each application. A bank might have a network for demand-deposit balances, a network for inquiring about loan balances, and so on. The bank branch would be served by a number of separate data networks plus the public telephone system. More and more companies are building communications networks that carry data, voice, and video signals over the same communications lines. With today's
I n t h e middle o f an economic boom, many companies are cutting back on travel due to rising airline fares for business travelers. American Express figures that expenditures for travel and enterta i n m e n t have risen 25 percent since the Gulf War; business fares are up 20 percent or more in major mar kets. Some travel industry surveys have indi cated that companies are reducing travel by up to 15 percent. Black & Decker has in the past sent employees on around 25,000 trips in a year, but this year it managed to reduce that number by 2000. A company like Bell Atlantic is substitut ing teleconferencing for some face-to-face meetings. One manager now holds staff
meeti ngs on phone and video instead of flying eight employees to New York twice a month. Before each meeting, he distributes documents by e-mail. The total savings are $72,000 a year, and this manager figures the company could cut its travel expenses by 1 0 percent if it held more conferences electronically. Electronic communications can SUbstitute for certain kinds of travel, saving both money and the time of those who normally travel to face-to-face meetings. Social contact among people who work together is important, but communications allow you to reduce the number of physical meetings, though not eliminate them altogether.
279
280
PART THREE: I N FORMATION TECHNOLOGY
technology and the deregulation of the communications industry, a firm can de velop a network that includes common carriers or excludes them completely. A company might lease lines and use the local telephone company for the local distribution of voice and data at the ends of the leased lines. Alternatively, it could bypass the telephone system completely by using satellite distribution. The brokerage firm discussed in Chapter l 3 communicates with its branch offices throughout the United States by leasing time on a satellite transponder. It places a satellite dish on its headquarters and one on the roof of each branch office. The firm can now send voice, data, and video signals without using the public tele phone network. The offerings described in the preceding section-frame relay, SMDS, and ISDN-represent efforts by the common carriers to offer an alternative to private networks. Although these same carriers may lease lines for a network, it is likely that the total amount of service they provide will drop if a private network is in stalled. The decision whether to use common carrier facilities or develop a private network is a very difficult one. Even a small firm may lease a line between a cor porate headquarters office and a factory some distance away. Large firms often have worldwide private networks. The decision to develop a private network must be based on cost considera tions, service levels, planned communications growth, and a forecast of what ser vices will be available from common carriers. Also competing with a private net work is the Internet, which can be used for a variety of communications needs. However, the Internet of today is not well suited to high-volume transactions like those that travel over the private networks maintained by the airlines and many banks. Worries about Network Security
There have been many network security problems; networks are a tempting target for mischief and fraud. An organization has to be concerned about proper identi fication of users and authorization of network access, the control of access, and the protection of data integrity (Goldman, 1 998). A firm must identify users be fore they are granted access to a corporate network and that access should be ap propriate for the given user. As an example, an organization may allow outside suppliers access to its internal network to learn about production plans, but the firm must prevent them from accessing other information like financial records. Finally, the organization should preserve the integrity of its data; users should only be allowed to change and update well-specified data. These problems are ex acerbated on the Internet, which we discuss in the next chapter, where individuals must be very concerned about fraud, invalid purchases, and misappropriation of credit card information. Providing network security is a difficult challenge. Almost all networks require some kind of logon, including user name and password. Many people are casual with their passwords, making them easy to guess. A good password has both let ters and numbers along with a few punctuation marks for added security. Most corporate security goes far beyond passwords, however. One common approach is
CHAPTER 1 1 : COMMUNICATIONS
a "fire wall," a computer that sits between an internal network and the Internet. The fire wall allows access to internal data from specified incoming sites but tries to detect unauthorized access attempts and prevent them from occurring. For highly secure communications, a sender can encrypt data, that is, encode the data so that someone without the "key" to decode them cannot read the message. There are a number of encryption approaches, and controversy exists over how strong the encryption should be. The most secure approaches use longer keys, making it much more difficult for an intruder to compute the key. However, the U.S. government is concerned about terrorists and criminals who might have access to strong encryption that is beyond the capabilities of law enforcement authorities to decrypt. There are also export restrictions on encryp tion programs . For Internet commerce, various schemes have been proposed for sending credit card or other payments over the network in a secure manner. Some involve en cryption and others various forms of digital certificates or digital cash. Many firms worry that customers will not want to complete transactions on the Internet be cause of the fear their credit card numbers might be stolen. At least one card issuer has agreed to cover such losses completely, and there is a law that limits individual liability for credit card misuse to $50. How do you dispose of your copies of a credit card receipt from a store or restaurant? Do you throw them in the garbage where someone else can access your number? Is the Internet more or less secure than a paper credit card transaction? THE CONTRIBUTION OF COMMUNICATIONS
Firms take advantage of the opportunities provided by telecommunications and networks in a number of ways. Two important contributions of this technology are electronic mail (e-mail) and electronic data interchange (EDI). In several indus tries, information technology is also used to create electronic markets. Electronic Mail as a Communications Tool
One of the most beneficial results of the marriage of computers and communica tions technology is electronic mail. Computer users with appropriate software and communications links can send messages and documents to other computer users. Electronic mail is analogous to physical mail handled by the post office, except it is not stored or handled physically. When someone sends you an e-mail message, it goes into your "mailbox" on the computer. When you check your mail, the mes sage is there for you to read and respond to if you like. It has been estimated that more than 40 million people in the U.S. use e-mail. How does e-mail work in industry? Recently, some 53 engineers at Digital Equipment Corporation in Massachusetts, Arizona, Colorado, Singapore, and Ger many collaborated on the design of a new disk drive using e-mail. Most had never met, and the engineers rarely phoned each other. DEC estimates that this diverse group completed their task a year sooner and with 40 percent fewer people than a comparable team assembled in one building.
281
282
PART THREE: I N FORMATION TECHNOLOGY
Most companies with large e-mail systems also have large networks. Hewlett Packard has a network of 94,000 mailboxes and a volume of 350 million mail messages a year for its 90,000 employees. (There are more mailboxes than em ployees because some mailboxes are assigned to workgroups.) In 1991 the faction in the Soviet Union trying to overthrow Gorbachev told the world that he was "sick." They also told the Soviet population that the interna tional community supported their new government. Within hours, computer and fax machines in Russia received information from around the globe that contra dicted these assertions. Supporters rallying around Boris Yeltsin at the Russian White House received e-mail messages on a Moscow computer that NATO, the U.S., and other countries were on their side. It was easy for the members of the coup to control domestic newspapers, radio, and television, but it was not nearly so easy (and they probably did not realize it existed) to control communications via e-mail. Electronic Data Interchange
When we discussed corporate strategy in Chapter 5, we made the point that the firm must be connected electronically with customers and suppliers. One rap idly growing technique for this type of interconnection is ED!. Detroit auto manufacturers were among the first companies to encourage suppliers to accept orders electronically. The idea is simple: A buyer sends an order electronically to the supplier, and the supplier acknowledges the order electronically. When the supplier sends the ordered items, the customer electronically acknowledges receipt. Similarly, the firms set up an electronic billing and payment system. The concept is very simple, but the reality of implementing EDI is much more difficult. Because each firm has its own formats for each of the paper documents used prior to EDI, there are problems of compatibility. Where is the quantity-ordered field on a GM order? The American National Standards Institute (ANSI) has de veloped a standard known as ANSI X.12 to specify common document formats for the transactions involved in ordering, receiving, and paying for merchandise. (It can take some 17 different transactions to complete an order.) You can purchase packaged software to help implement EDI, and newer gener ations of this software allow for mapping. A programmer can map the fields from your invoice into the location of fields in a supplier's purchase order system. You can then place your order in its accustomed format, and the software will translate it into an order that the supplier's system can accept. Given all this overhead, it can take a significant amount of time to develop EDI links with customers and suppliers. As you might have observed, this type of EDI is basically a batch transmission. At different times during the day, a firm connects its computers with different EDI partners to transmit and receive data. The next step in development will be on-line access. Customer and supplier computers will be connected all day so up-to-date information will always be available.
CHAPTER 1 1 : COMMUNICATIONS
A In today's oil business, an Amoco executive puts it simply, "The company that finds the most oil makes the most money." However, drilling for oil is very expensive. A high-speed network would let engineers and geologists rapidly access the information they need to identify promising drilling sites. The objective of Amoco's high-speed data pipeline project, begun in 1 993, is to cut the screening time for drilling data from months to hours. To accomplish this goal, the company built the Aries network, which has nearly a dozen T3 (45 Mbits/second) circuits and leased lines along with a satellite T1 (1 .544 Mbits/second) link to offshore platforms. The network is based on ATM technology and i ncludes routers, adapters, and ATM switches. Actual
ATM services are provided by three different common carriers. At a demonstration in Washington, D.C., a participant used the I nternet to s u rf through Web servers in Minneapolis and re turned information in minutes instead of the hours required using dial-up links . Geolo gists at workstations in Houston and Wash ington worked coliaboratively on a huge seismic data set delivered from an offshore oil platform. A site in Chicago broadcast a f u l l motion video segment to H o u st o n , Washington, and Tulsa. Amoco is ahead of most firms in setting up this kind of high-speed network. It is an excellent precursor for the kind of networks that should start appearing in business.
Beyond the Model T
Ford Motor Company has a rich history of technological innovation. After all, Henry Ford developed the first assembly line. Ford is continuing to develop closer links with its suppliers using ED!. It was a pioneer in the field in the 1 970s. Ford began by compressing the time it takes to order and receive goods and is now working on eliminating the need to track goods on the way to its plants and to audit supplier invoices. Most EDI is not real-time. While data are exchanged electronically, the trans mission process sends a batch of documents at one time. For many firms there is no need for an order to be processed immediately upon transmission from a cus tomer. However, as manufacturers move toward more just-in-time manufacturing, communications will have to be faster. Ford established direct links with its suppliers who can now dial in to Ford's mainframe material system, which tracks inventory at the car maker's 20 assembly plants. Ford's 6 1 manufacturing locations and 10 of its parts supply sites will soon be on-line. Suppliers send their asynchronous inquiries to a value-added network offered by Tymnet. [A value-added network (VAN) provides a range of services to its customers. The network vendor generally leases lines from a common carrier and adds services or value to the leased lines.] The network converts the traffic to the IBM mainframe data stream needed to access Ford's computers. A typical sup plier logs in four or five times a day to check Ford's inventory so it can coordinate production with the automobile manufacturer.
283
284
PART THREE: I N FORMATION TECHNOLOGY
Large suppliers are even establishing dedicated links into Ford systems. Em ployees at Dana, a major components supplier, will be able to use the terminals al ready on their desks to toggle between Ford systems and internal Dana computers. Ford allows suppliers to update its database when they send a shipment of parts. Ford no longer accepts invoices from suppliers. When parts arrive at a Ford facility, an employee scans a bar code on the crate containing the parts, generat ing an electronic receipt. The receipt message travels over Ford's network to the accounts-payable department, which matches the order with a price previously negotiated with the supplier. Ford mails a check (maybe someday an electronic payment will be possible) and sends an electronic remittance message to the supplier. Ford' s suppliers all participate in the electronic receipts program while about 1 50 receive remittance information. The advantage to Ford is that the sup plier has to audit payment, rather than Ford having to audit invoices. As you might expect, Ford's EDI program does not end with suppliers. Ford has 12 major railroads with which it exchanges EDI transactions. Ford issues an elec tronic bill of lading when goods must be moved between sites, using the ANSI X. 12
CHAPTER 1 1 : COMMUNICATIONS
standard. The electronic bill of lading goes to the railroad via a direct link or through IBM's Information Network. The railroad returns an acknowledgment and takes over the responsibility for tracking the shipment. Ford also wants to encourage its suppliers to communicate by e-mail. The firm wants to save on overnight-mail and long-distance charges, and to improve re sponse times over the typical phone call (which ends up on an answering machine). E-mail could also replace a cumbersome paper-based process for cost-saving ideas submitted by suppliers. Ford figures that e-mail will make it so easy to send sug gestions, it would get far more ideas from the suppliers than it does today. Ford also has another network for sending computer-aided design (CAD) dia grams among plants and to suppliers that use Ford's CAD system. This packet switched network uses a combination of public and private lines. Suppliers can down load design plans from Ford to incorporate changes in different parts more quickly. Building an Electronic Market
As companies use communications for buying and selling products, they are creat ing electronic markets, as we discussed in Chapter 4. One of the oldest and most successful electronic markets is the NASDAQ, the market for over-the-counter (OTC) securities (securities not listed on the New York, American, or regional stock exchanges in the U.S .). Members of the National Association of Securities Dealers use this system for trading. If you buy or sell OTC shares, your broker uses this system. The NASDAQ is an on-line computer system in which market making firms post bids and ask prices for individual securities. Other brokers can accept these quotations and transact business for their clients. The system is very successful and was adopted by Japan to create an electronic market. In the U.S. there are a number of other electronic markets including TELCOT, a market used for trading cotton. In France, the national Minitel system makes it possible for a number of firms to sell their products very inexpensively using com puter terminals. To the extent that there are competing firms offering products, a Minitel user can compare prices among the different vendors, creating another type of electronic market. We could argue from a strategic standpoint that batch-oriented EDI tends to re duce market competition by creating a close link between a supplier and a cus tomer. With a proprietary interface, switching to another vendor is difficult. As in dustries adopt standards such as ANSI X. 1 2 or use the EDI services of a value-added network, this linkage is weakened because now it is easy to switch to another supplier. In a full electronic market like the NASDAQ, where everyone is on-line at the same time, firms can easily switch vendors and there is little strate gic advantage to an electronic link between one firm and another. All players tend to be equal in an electronic marketplace. TRANSFORMING ORGANIZATIONS AND THE ECONOMY
In a mature firm, you are most likely to encounter an infrastructure that features networked computing. There will be computers of varying capacities at different
285
286
PART THREE: INFORMATION TECHNOLOGY
FIGURE 1 1 · 1 0
A typical computing complex.
nodes (see Figure 1 1-10). There are local workstations, terminals with significant logic, and built-in personal computers. Communications networks tie all the vari ous devices together and help to interface dissimilar pieces of equipment. In Fig ure 1 1-10 we see a group of interconnected mainframes for transactions process ing and access to large data files. The mainframes manage a large database through a specialized database processor. The mainframes also act as large servers for users on the network. A router links the computer to remote workstations, consisting of personal computers and servers in a local area network. There is a gateway (a connection between two computers on different networks) to other networks as well. The firm is connected to the Internet over one gateway and has a server that allows
CHAPTER 1 1 : COMMUNICATIONS
FIGURE
1 1 ·1 1
The electronic economy.
customers to obtain transactions information from the mainframe via the Internet. All these trends lead to an increasing availability of computation and significant opportunities for inventive information systems. Figure 1 1 - 1 1 shows how this typical firm is connected with other organizations, including suppliers, customers, and financial institutions. The development of in· terorganizational systems (lOSs) is having a dramatic impact on the way firms operate. In the figure, the company is connected directly with its suppliers and customers, probably through some form of EDI using an industry standard format. For some suppliers, the company may make use of an electronic market for its purchases. The firm is connected to the Internet for e-mail, which it uses to com municate with a large number of other entities. Electronic links to banks and other financial institutions eliminate much of the paperwork involved in processing re ceipts and payments. The vision of an electronic economy emerges from Figures 1 1- 1 0 and 1 1 - 1 1 . Firms are networked both within the firm and externally to other participants in the economy. They use electronic communications and linking and electronic customer supplier relationships to design their organizations. Information technology makes
287
288
PART THREE: INFORMATION TECHNOLOGY
possible the sharing of data and infonnation while facilitating communications and coordination among key components of a postindustrial economy. It is this combina tion of computer and communications technologies that is transforming not only the organization but the economy as well. CHAPTER SUMMARY 1. Communications is the key to developing greater connectivity among individ
uals within a finn and among different organizations. 2. The simplest communications occur between two computer devices, such as a PC connected to a server. 3. Your PC uses a communications protocol such as Ethernet to communicate with the server. 4. If you are using the dial-up phone network, a modem translates the digital signals from your PC to an analog fonnat for transfer over the phone line. At the receiving end, a modem demodulates the signals and produces digital output. 5. Most long-haul communications lines and the lines within many cities are dig ital. The analog data from the local loop to your phone has to be digitized to use these lines. The phone companies also want to digitize video infonnation (like movies) to send it to your home. 6. A network connects a variety of computers and other devices. The LAN is the smallest such network and may connect only a few computers in a department. 7. Larger networks extend over thousands of miles, and there are a number of global networks. 8. A company may lease lines from a common carrier in order to build a private network. The company can use this network for voice and data transmission. 9. The common carriers are also offering services that companies pay for on a usage basis instead of leasing lines. An example of such a service is frame relay transmission. 10. Greater connectivity through networking has increased the use of EDI, which draws customers and suppliers more closely together. It is one way in which communications and networks are transforming relationships among companies. IMPLICATIONS FOR MANAGEMENT
The combination of computers and communications has a greater impact than either element alone. Computers alone are great for computation and for maintaining huge databases. Add telecommunications and you create a myriad of new ways to apply infonnation technology. Communications and networks have finally convinced some skeptics who argued that computers are nothing but large, fast calculators. Comput ers and networks offer both computational and communications capabilities that
CHAPTER 1 1 : COMMUNICATIONS
allow for an unprecedented level of coordination and communication within and among firms. Communications is one of the fundamental tasks of management. KEY WORDS
ADSL Amplitude Analog signal ANSI X. 1 2 ASCII Asynchronous transfer mode (ATM) Asynchronous transmission Attenuation Bandwidth Baud Block mode Bridge Byte Cable modem Character mode Code Compression Concentrator CSMAlCD Demodulation Ethernet Frame relay Frequency Full duplex transmission Gigabit Ethernet Half duplex transmission Host Integrated services digital network (ISDN) Interorganizational system (lOS) Local area network (LAN) Metropolitan area network (MAN) Modem Modulated Multiplexer Multiprotocol router Network Network Interface Card (NIC) Node
289
290
PART THREE: I N FORMATION TECHNOLOGY
Packet switching Point-to-point protocol (PPP) Protocol Pulse code modulation (PCM) Router Satellite Server Simplex transmission Switched network Synchronous mode Terminal TI Token ring Transmission Control ProtocollInternet Protocol (TCPIIP) Value-added network (VAN) Voice-grade Wide area network (WAN) X.25 RECOMMENDED READING Goldman, J. E., Applied Data Communications. 2nd ed., New York: John Wiley, 1 998. (An up-to-date communications text with a management perspective.) Panko, R., Business Data Communications. Upper Saddle River, NJ: Prentice-Hall, 1997. (A thorough coverage of communications, both voice and data.) Varshney, u., "Networking Support for Mobile Computing," Communications ofAlS. 1, 1999. (A well-written tutorial on mobile computing. Also look at http://www.cais.aisnet.org)
DISCUSSION QUESTIONS 1. Why
were the first telephone communications over analog circuits? What is a protocol? 3. What is the greatest limitation on transmission speed in the public switched telephone network? 4. What are the advantages of digital over analog lines? S. Why are communications between computers digital in nature? 6. Why do we use an 8-bit code for transmission instead of one that is 5 or 6 bits? 7. Explain how Ethernet keeps two networked PCs from transmitting at exactly the same time. S. Why are standards so important in communications? 9. What is the difference between synchronous and asynchronous transmission? 10. What is the advantage of using voice-grade lines for time-sharing in a university environment? 11. Why is packet switching so popular for computer networks? 12. Describe at least one network configuration. For what applications do you think it is most suited? 2.
CHAPTER 1 1 : COMMUNICATIONS
13. How do you connect different networks
to each other? How can you use packet switching to connect to the Internet with a service provider using your home telephone? 15. What are the major differences between a LAN and a WAN? 16. Why would a bank develop its own entirely private communications network using satellites? 17. What function does a multiplexer serve? 18. What is the difference between a multiplexer and a concentrator? A router? 19. When should a firm consider using the Internet versus developing a private communications network? 20. Why might a LAN not have a host computer? 21. Can you think of any disadvantages of satellite communications? 22. What has motivated the common carriers to develop frame relay, ISDN, and ATM communications lines? 23. Why is a communications specialist needed to design a network? 24. Think of a business with which you are familiar. In what ways would a network and data communications aid this firm? 25. Why does the systems designer need to have some knowledge of data communications? 14.
CHAPTER
11
PROJECT
Data base Assignment, Part III Mary Simon looked a t the portfolio application and said, "This is just what I need for a job I've just taken on. Of course, this job really isn't for Simon Mar shall Associates-but then again, one good source of clients would be our alumni." Mary had just agreed to help in fund-raising for her school and realized that the campaign would require some good record keeping. Your third database assignment is to set up the alumni contributions records system for Mary. The key to this assignment is to remember that relations can be merged through a join operation.
A l u m n i Records Mary Simon is very active in the alumni affairs of her university. She has been asked to keep track of the alumni contributions flowing into the university, most of which we hope are for the business school. The records she needs to keep are con tained in four relations: Alumni Contrib School Type
291
292
PART THREE: INFORMATION TECHNOLOGY
Please do the following exercises: 1. Create a list of donors who have given a chair or endowment. 2. Create a list of donors who have given unrestricted funds to the business school. 3. Create a list of cities showing total contributions from each. You will find it helpful to use the sort command and to create a report to do the subtotaling by city. 4. Use the report generator to create a report showing the last name, zip code, and amount of each donation along with a printed message showing the school and type. For example, if someone had a school of 4 and a type of 1 , the report should read "Business" and "Endowment." Your report should in clude the sum of the donations. Alumni Last name
Smith Doe Carson Altman Giuliani Smith
First name John Mary
John Sam Rudy Tom
City Chicago New York Omaha Washington New York Cambridge
Street 1 8 Portland Rd
90 Trinity Place 1 77 Dover Center 1 600 Pennsylvania Av City Hall 34 Harvard St
State IL NY NE DC NY MA
Zip 1 2345 10006 68 1 14 11111 10 10 1 021 39
Contrib Last name Smith Smith Doe Carson
Carson Giuliani Smith Smith Smith Doe Giuliani Giuliani Smith
Zip 1 2345 1 2345 10006 68 1 14 68 1 14 10 10 1 02139 1 2345 1 2345 1 0006 10 10 1 10 10 1 021 39
Type 2 1 4
School 1 3 4
3 4 3 3 3 4 3 4 2 4
2 1 2 4 2 4 3 2 1 3
Amount 50,000 40,000 100,000 50,000
25,000 10,000 45,000 75,000 38,000 1 50,000 50,000 10,000 1 8 ,000
CHAPTER 1 1 : COMMUNICATIONS
School School code I
Name
Arts & Sciences Law Medical Business
2 3 4 Type code I
Type Endowment
2 3 4
Chair Special Unrestrict
293
CHAPTER 1 2
I
Iii
I
Outline The Impact of Communications Technology Building Networks
Commercial Network Providers A National Network Infrastructure: The Minitel System Internet: A Case of Phenomenal Growth
Intranets and Extranets The Poteutial of Electronic Commerce
The Nature of Markets New Business Models
Focus on Change
A decade ago, academic, government, and research organizations owned the Inter net. Companies could not use the Net for profit-making activities. Since the gov ernment stopped funding the Net and removed the profit-making restriction, the Internet has literally changed the world. Almost every country in the world, and certainly all developed countries, are connected to the same computer network. In ternet companies present new models for doing business, and their stocks sell for fantastic prices. The Net affects individuals, organizations, the economy and na tional governments. For an example of frame-breaking change from technology, we need look no further than the Internet. 294
CHAPTER 1 2: NETWORKS AND ELECTRONIC COMMERCE
Networks also facilitate the development of new forms of organization. They are key to building the T-Form organization discussed in earlier chapters. Net works make it possible to connect with partners and customers as they encourage firms to form strategic alliances. Networks facilitate the creation of virtual sub units, where your firm relies on another to provide a component that you would normally manage, such as a raw materials inventory. •
One of the most important developments in the history of information technol ogy is the evolution of the computer from a calculating engine to a communica tions tool. As a calculator, computers are extremely valuable. It is hard to imagine businesses operating on the scale they do today without the capabilities of the computer. However, the computer's role as a communications device may dwarf its impact as a calculator. Computers and communications are allowing us to change the structure of organizations and the nature of commerce. In this chapter we look at the world of networks. The first networks were used by business for electronic linking and communications and for electronic customer-supplier relationships. Most proprietary or private networks were de veloped for use within a single enterprise. For example, the first bank networks connected tellers in branches with a central computer that had information about customer checking accounts. Electronic data interchange involves customers and suppliers. Here compa nies agree to standards for exchanging information. Railroads and their ship pers agree on a standard to use for the data that must be exchanged for shipping
a The existing U.S. telephone network is con stantly upgraded. Higher speed and capacity links are having a dramatic effect on life in some parts of the country, especially in rural areas. Some 400 rural counties where popu lation d ropped during the 1 980s are now growing, and 900,000 people moved to rural counties during 1 990 and 1 991 . To revive its rural areas, Nebraska state officials pushed local phone companies to install fiber-optic lines and digital switches. The carriers laid 6700 miles of fiber-optic lines in the state linking all but five of the state's counties. The impact of this new network has been dramatic. During the 1 980s, Aurora, NE, with a population of 3800, had over 1 2 empty store fronts and the population was shrink ing. Today the unemployment rate is less
than 1 .5 percent, and all the stores are occu pied. An Aurora pet food plant uses the net work to link to its headquarters in Ohio and to shippers and customers around the coun try. The company said that a decade ago communications would not be on its top 1 0 list of reasons to locate a plant someplace. Today it is in the top three. O n e s m a l l h i g h school in a town of 1 35 people uses the network for interactive television classes i n Spanish since the school is not able to justify the cost of hiring a language teacher. Students use a fax ma chine for written work. Ainsworth, NE, has a two-way videoconferencing unit in the town library. Recently senior citizens used the system to discuss arthritis with n u rses i n Omaha.
295
296
PART THREE: I N FORMATION TECHNOLOGY
products by rail. A new customer can begin exchanging data with the railroads by following this message standard. Mass market networks appeal to consumers. Examples of these networks in clude America Online and the ATT Worldnet in the U.S., and the Minitel sys tem in France. Minitel has grown to be more than just a mass market consumer network as it provides a number of business services as well. The most significant network in terms of growth is the Internet. This chapter explores the Net and ex amines the potential that all these networks have for electronic commerce. THE IMPACT OF COMMUNICATIONS TECHNOLOGY
In the last chapter, we discussed the telephone system as an example of a large in ternational network. This network has a number of important features. First, it is ubiquitous, at least in the U.S. where almost all residences have a telephone. Even though there are different phone companies, they all "interoperate"; that is, a call from a regional Bell company can be made transparently to a phone in a GTE company. By adhering to international standards organizations, telephone systems interoperate at the country level, and you also can direct dial phones in a large number of foreign countries. This phone network carries voice and data. One of the nicest attributes of the telephone network is its physical presence. We have a communications infrastructure that makes it simple to plug a new telephone or fax into the network. We can buy a telephone from a number of different sources and know that it will function on the network because there are published standards and because vendors manufacture their equipment to meet these standards. BUILDING NETWORKS
Developing computer networks is not as easy as adding a telephone. There is no single infrastructure for data comparable to the voice network. Of course, one can simply use modems and dial-up voice lines, but for many applications this alterna tive is either too costly or not feasible because the voice lines are too slow for data transmission. In the U.S., we typically find that companies have developed two different kinds of networks, electronic data interchange (EDI) and/or proprietary data networks. Generally, EDI refers to networks in which multiple parties have agreed to follow a standard for exchanging data electronically. EDI networks exist in retailing, trans portation, and insurance. There is a national standard in the U.S. called ANSI X. 1 2 and a European standard called EDIFACT. Most EDI takes place in batch mode; a computer generates orders and sends them to a supplier. The supplier receives the order and processes it and other orders when convenient, possibly in a batch. There i,s little or no on-line interaction between people as there is when you use the Inter net to order a product and interact with a company's Web site. In private industry and government, EDI is extremely popular for lowering costs while increasing accuracy and quality in purchasing goods. One objective of EDI is to reduce manual keying, thereby reducing errors and speeding up the
CHAPTER 1 2 : NETWORKS AND ELECTRONIC COMMERCE
order cycle. By exchanging data electronically, organizations can change their production cycles and the kind of services they offer. Despite their achievements, EDI networks have less impact than one would ex pect because they cannot rely on a common telecommunications infrastructure. As a result, to use EDI effectively takes expertise and resources. The high cost of net working gives larger firms an advantage over smaller competitors in using data networks. The Chrysler JIT-EDI example shows tremendous gains, but Chrysler is a very large company, ranking in the top 1 5 in sales in the U.S. Given the lack of a data network infrastructure in the U.S., firms face a bewil dering number of choices when considering the development of a network applica tion. These applications are expensive to develop since there is much reinvention with each new network. For companies to exchange data they must completely agree on data formats. A firm sending a purchase order must put data in exactly the right place in the electronic message so the supplier can interpret it. The ANSI X.12 standard is intended to facilitate this process, but a number of industry-specific networks do not conform to the standard. Due to incompatibili ties, some press reports indicate that up to 50 percent of the data exchanged via EDI need rekeying. A firm must change its internal computing systems or pur chase special software to map the data from existing systems to an accepted EDI standard. While some service companies can help a company get started and PC EDI packages are available for smaller firms, the start-up and maintenance costs are too high for many companies. It is also hard to get all trading partners to use ED!. Generally, large firms are more sophisticated technologically and can afford the development cost. To alleviate these problems, a group of Northern California companies created a consortium called CommerceNet. The objectives of this ambitious project are to allow companies that have never done business before to establish and maintain a relationship electronically. The company plans to use the existing Internet, dis cussed later, as its underlying network. It must develop agreements on standards for proposals, bids, price lists, and other transactions. The idea is that a company, say in Palo Alto, could put out a request for proposals in the morning and receive bids from respondents all over the world by evening. The next morning it could send an electronic purchase order to the winner. AT&T, Novell, and Lotus are also working together to allow companies to link Notes and NetWare networks more easily, thus creating another venue for electronic commerce. Partially because firms cannot rely on a national data infrastructure, they have developed elaborate private or proprietary networks, sometimes using common carrier facilities and at other times bypassing them completely. Examples of famil iar companies using proprietary networks include Federal Express and United Par cel for package delivery, United and American Airlines for their reservations sys tems, Frito-Lay for distribution and decision support, and Allegiance for supplying its customers. These networks are proprietary because they do not follow any kind of industry standard. Each of these firms has to bear the expense of designing, implementing, and oper ating a proprietary data network. Some of these efforts even required inventing new
297
298
PART THREE: I N FORMATION TECHNOLOGY
First Direct is an example of the future of banking in the world. This bank is located in the industrial city of Leeds, England, and its headquarters are in a huge building resem bling an aircraft hanger next to a n uclear power plant. First Direct is a "telephone only" bank; there are no walk-up branches or win dows. It is also the fastest growing bank in England, opening 1 0,000 accounts a month, or the equivalent of two or three physical branches. Surprisingly, First Direct has used tech nology to create a more personal relation s h i p w i t h its c l i e nt s , e v e n t h o u g h t h e banker a n d client d o not meet physically. Some 24,000 calls a day come to First Di rect's two facilities, staffed at peak times by 1 50 bankers. Scoreboards on the walls show the number of customers on hold and how long they have been waiting. Posters chart the sales of credit cards and other services for the month. The bank becomes more personal by using technology to look for opportunities to cross sell new products and services to a customer. When, for example, a customer
calls to check her balance and make a trans fer to pay a credit card bill at a rival bank, the First Direct representative sees a mes sage on the screen that says "No Adverse Risk" meaning that the bank would be glad to loan money to this customer. The repre sentative sees the customer's employment and credit status and a list of prior transac tions with First Direct. He asks if the cus tomer has read the information First Direct recently sent on its Visa card, knowing that it carries a lower interest than the bank's ri vals. The customer says she will think about it, and the First Direct representative sends her a prepared application for a Visa card. First Direct is a division of Midland bank, and it tends to appeal to profeSSionals with a good income. The average balance is ten times higher at First Direct than Midland while its overall costs are 61 percent less. First Direct makes money on 60 percent of its customers, compared to 40 percent at the average British bank. Banking with IT will dramatically change the physical structure of the banking industry; First Direct is a model of what is to come.
technology. Frito-Lay undertook the development of a hand-held computer for its drivers to use for placing orders and keeping records. If a fIrm operates in an industry that cannot support or has not used EDI, it must decide whether it wants to develop a proprietary data network for its applications, use a service company's existing net work, or develop its application on the Internet. Commercial Network Providers
A few years ago the U.S. had a number of competing mass market services includ ing Prodigy, Compuserve, Genie, Microsoft Network, and America Online. These companies offered their own services, chat groups, e-mail and entertainment. The development of the Internet threatened the business model for mass market ser vices; most content on the Internet is free and available to anyone on it. Service providers, those offering content on America Online or the Microsoft Network, also had a need to be present on the Internet. There, they would have to provide at no charge what customers had to pay for on America Online. Most of the mass market networks have reconfigured themselves to be Internet service providers
CHAPTER 1 2: NETWORKS AND ELECTRONIC COMMERCE
FIGURE 1 2-1
America Online home page.
and gateways to the Net. Having purchased parts of Compuserve in 1997, Amer ica Online appears to be the most successful of these firms today. See Figure 12-1 for an example of a screen from AOL. A NATIONAL NETWORK INFRASTRUCTURE: THE MINITEL SYSTEM
There are two examples of national and international networks that resemble the "information superhighway:" the Minitel system in France and the Internet based in the U.S. The French Teletel system, popularly called Minitel after the name of its first terminal, was introduced by France Telecom, the French government sponsored telecommunications company, in 1 982. Ten years later, Minitel was used in 20 percent of households and 80 percent of businesses in France. Today users access a wide array of communication, information, and business transaction services. Approximately 6.5 million Minitel terminals are in service in France, which has a population of 57.5 million. Another 500,000 residents of France use Minitel on their personal computers. Altogether about 40 percent of the nonretired French population have access to Minitel either at work or at home, and a total of about 1 5 million users are active on the system. Some 25,000 services are avail able on the system, a number growing at the rate of 10 percent a year. Minitel is considered by many to be a mass market system aimed at the con sumer. It is the first and only example of a successful mass market network ven ture in the world. It is successful in the sense that it reaches a large proportion of French households and businesses, offering a rich variety of information, commu nications, and services; and it is estimated to be profitable. In 1 989, France Telecom introduced a nationwide electronic mail system for businesses and the general public. Information services include the national, on-line
299
300
PART THREE: I N FORMATION TECHNOLOGY
(a)
(b) FIGURE
1 2·2
(a) The Minitel Guide to Service. (b) A display from the national railroad, SNCF.
telephone directory, schedules for the French national railroad, as well as want ads, stock market reports, and other information that might be found in a newspaper. There are also short-lived or highly specialized information services for the general public. For example, sports fans can access continuously updated information about the position of boats in around-the-world yacht races, and parents sending their children to camp can access daily lunch menus. The Minitel Guide to Service and a display from the national railroad, SNCF, are shown in Figure 12-2. Because Minitel is built on a nationwide data network with open standards, businesses also make use of the network for business-to-business services. While
CHAPTER 1 2 : NETWORKS AND ELECTRONIC COMMERCE
Minitel began with a mass market focus, in recent years residential growth has slowed and been replaced by a large growth in business applications. In 1 990 about half the services were business related. Some of these business services are traditional information services, with information-such as stock market listings, economic data, or airline schedules-tailored to the interests of business cus tomers. Other business applications are business-to-business transaction services, very similar to EDI and proprietary network applications in the United States. Brun Passot, the second largest office product supply company in France, dis cussed in Chapter 1 , encourages its customers to order electronically via Minitel. For large volume customers, Brun Pas sot installs a computer with a proprietary connection to its order processing and reporting system. A number of case studies conducted by Charles Steinfield at Michigan State University illustrate what can be done with a network that connects business to small firms and consumers. A large multinational, electrical appliance and con sumer electronics manufacturer used Minitel for EDI-like connections to approxi mately 10,000 separate retailers and independent repair people throughout France. In addition to the major cost savings this manufacturer achieved by better manag ing inventory and reducing transaction costs, the firm also introduced a revenue producing expert-system-based training application that assists the service force in the diagnosis and repair of appliances and electronics products. Repair staff are charged on the basis of connect time for use of this service. In addition, the expert system accumulates data on repair problems and provides feedback to the design and manufacturing divisions of the company in order to help detect and correct po tential structural flaws in their products. Ubiquity enables other innovative business applications as well. In one, a clothing manufacturer was able to use the Minitel terminals already in many bou tiques to offer a custom-tailored business suit. A clerk takes a customer's measure ments, ships them over Minitel to a computer-controlled cutting machine at the factory, and the factory returns a custom-made suit in several weeks. Another ap plication is the trucking spot market created by Lamy, the French directory pub lisher. Freight forwarders transmit special shipment requests to a Minitel database that truckers search as they attempt to fill excess capacity or to fill up on a return trip. Upon finding a matching offer, the truckers immediately call the forwarder to make a bid. Discussions with French firms suggest it is possible to develop a national order entry system using Minitel in several months for well under $50,000, something very difficult to accomplish in the United States if you must build a proprietary network for the application. France Telecom has been making about $ 1 .5 billion a year on the service. The major drawback to Minitel today is its slow speed and lack of interesting graphics. Minitel is well established in France, but the question is whether it can be modernized and maintain its dominant position given competition from the In ternet. France Telecom, the operator of Minitel, is working to upgrade the speed of the network and to offer more exciting graphics. A "photographic" quality termi nal is now available. Customers can arrange to access Minitel through an ISDN
301
302
PART THREE: INFORMATION TECHNOLOGY
line, and they can connect to Minitel through a LAN. The Internet has grown less rapidly in France than in the U.S., probably because of its high level of content in English, the lower home ownership of PCs in France (about 16 percent), and Mini tel itself. France Telecom has a subsidiary, Wanadoo, that is an Internet service provider (ISP), and there is internal competition between Minitel and this ISP. France Tele com is also working with IBM to develop a network that allows customers to surf the Web with simple, cheap, screen-based telephones like the Minitel terminals. Most of the management and navigational information, such as user profiles, will be kept on network computers since the local terminal has little memory or logic. This network may be the largest implementation of the "network PC" concept. After initially viewing the Internet as a vehicle of American colonialism, the Prime Minister of France finally endorsed the Net in 1 998 and allocated one bil lion French francs to help wire the country. He has stated publicly that Minitel is a "brake on the development of new and promising applications of information technology." It is possible that in a few years, Minitel will disappear as the Inter net expands. Such a transition, however, will place a heavy burden on Minitel service providers, so there will be resistance to phasing out this pioneering, prof itable system. Minitel illustrates the benefits of a national communications network; some of its applications are a precursor of Internet applications. The government encour aged the development of Minitel by giving away a large number of terminals, re placing printed telephone books with a national directory on Minitel, and making it easy for service providers to develop content for the network. Communications studies indicate that a network has to reach a "critical mass" to become successful; enough people have to use it and encourage others to join. A single telephone is not worth much, but a network in which everyone to whom you wish to speak has a telephone is extremely valuable. France Telecom used a variety of policies to reach a critical mass of Minitel subscribers and service providers. INTERNET: A CASE OF PHENOMENAL GROWTH
While Minitel shows one way a national data network can succeed as a result of a centralized governmental telecommunications policy, the Internet provides a de centralized model of a government subsidized network. The Internet is a world wide, interconnected collection of computer networks. It started in 1969 as the Arpanet, a military-sponsored research project on how to build reliable networks in the face of unreliable components. But over time, as additional research labora tories, universities, and even personal computer networks became connected to it, the Internet became an infrastructure for scientific and educational computing in the United States and in a significant portion of the world. One of the Internet's main virtues is that it lets a variety of heterogeneous computers connect to the network using a number of different communications options. The network operates on two core protocols, TCP (Transmission Control
CHAPTER 1 2: NETWORKS AND ELECTRONIC COMMERCE
" . . . A couple of years ago, there was no Web. Suddenly it's ubiquitous. And if ubiq uity weren't enough, it's still growing. Where did the Web come from? . . . One day there was nothing; the next day there it was, fully deployed. My first suspicion of something bom so instantaneously perfect is an alien origin. There was probably a meeting somewhere on a distant planet where they debated whether or not it was time for Earth to have the Web. 'They'll only botch it up,' the oppo nents probably argued. 'They'll put all kinds of garbage on it and ruin our good idea.' But the alien proponents and supporters of the Web carried the day. 'The Earth has all kinds of talented people eager to get
their material out to the public,' they un doubtedly said. 'Wonderful things will hap pen; just wait and see.' Whatever its origin, the Web is here, and it is changing our view of information, soci ety, and business. Perhaps most importantly, it is proving the efficacy of the long believed and hoped-for Field of Dreams approach-if we build it, they will come. The people of the earth have been empowered by the Web, and there has been an incredible outpouring of creativity and professionalism by amateurs everywhere. When you empower a few ama teurs, it's not much competition. But when you empower tens of millions, surprising things happen, some of them breathtakingly good."
Protocol) and IP (Internet Protocol). These protocols break a data stream into packets and give each packet a sequence number. IP is responsible for getting the packets from the sender to the receiver in the shortest possible time. TCP man ages this flow of packets and verifies that the data are correct. There are more than 1 00 TCPIIP protocols based on the core protocols described above. As a re sult, computers ranging from Sun workstations to personal computers to Macs can connect to the Net. The Internet is not a single network. It is a collection of over 60,000 networks, all having at least one server. Networks can be connected directly to one another, but most often they are linked through six official network access points in the U.S. Hundreds of service providers exchange traffic at these access points. A large service provider will have its own communications network which will include a number of local access points so customers can minimize their long distance charges. The service provider's backbone network connects all its local access points to the Internet. See Figure 1 2-3 for the map of one carrier's (UUNET) U.S. backbone. While the National Science Foundation originally subsidized the Net, costs today are shared by its users. In addition, institutions like universities supply labor in the form of highly paid professionals to maintain and upgrade the network. In stitutions pay a flat rate to join the Internet, and individuals in these organizations do not pay any fees. External access providers generally charge a flat rate for users to access the network in the range of $ 15-20 per month.
303
304
PART THREE: I N FORMATION TECHNOLOGY
The UUNET U.S. Backbone
FIGURE 1 2·3
The UUNET U.S. Backbone.
While it is not known with any certainty how many users exist, there are over 40 million host computers on the Internet, and there are over 1 00 million users in at least 1 50 countries. Between 1991 and 1 994, traffic on the Internet doubled annually. While scientists and engineers were early users, followed by academ ics, today the Internet is available to commercial firms and to the general public. Figure 1 2-4 shows the tremendous growth in Internet hosts. The Task Force that manages the Internet is looking at new ways to generate IP addresses, an address that each computer on the Net must have so that it can send and receive information. The Chinese would eventually like to have a billion IP addresses ! By the year 2000, it will not just be 200 million computers trying to connect to the Internet, it will be billions of computers, and the current addressing scheme will not be adequate for such numbers. You can connect directly to the Internet through an organization's computers. The domain name identifies the type of organization. For example, our address is first initial followed by last name@ stern.nyu.edu. An educational institution is des ignated by .edu, a commercial firm by .com, a government agency by .gov, and mil itary by .mil. With this kind of address, your organization has a computer con nected directly to the Net. From home, many people use access providers to reach the Net, and mass market services like America Online also offer access to the Web. There are also ISPs that exist only to connect you with the Net and generally charge $ 1 0 to $20 a month for this service. In November of 1994, the business volume of 1-800 (toll free) calls exceeded the volume of other business calls for the first time. AT&T wants to see that it captures data as well as voice calls through connections to the Internet on its AT&T Worldnet service. These access providers will also have to contend with cable TV companies offering Internet ac cess via cable modems, as discussed in the last chapter.
CHAPTER 1 2: NETWORKS AND ELECTRONIC COMMERCE
Internet Domain Survey Host Count
45,000,000 -.------__==_ 40,000,000
+-----
35,000,000
+----
30,000,000 +----25,000,000
+------
20,000,000 +-----15,000,000
+-----
10,000,000 +-----5,000,000 +-----o
+--+'--t--+--+"-+-+
FIGURE 1 2·4
Growth of Internet hosts,
The Arpanet was originally designed so scientists and others could conduct re search on computer networking itself and gain access to remote computers and files. The government also wanted to tie together diverse networks developed for the military by various low bidders, each providing different equipment. Within months of the opening of the Arpanet, however, interpersonal communication in the form of electronic mail and computerized bulletin boards became the dominant application. Today there are approximately 8000 bulletin boards distributed across the Internet. On-line real-time conferences, in which users join a group and chat by passing text messages back and forth, are becoming increasingly popular. There are also various multiuser recreational games. Today the Internet contains a huge variety of applications and information sources. In Philadelphia, PCs provided reading-improvement courses over the In ternet to 1 00 low-income homes in a recent test. No one signed up for classes when offered in the schools, but students and some parents eagerly registered when given the opportunity to use borrowed computers in the safety and privacy of their own homes. The Internet Talk Radio Show provides news and entertain ment to users with audio software and speakers on their workstations. A project at NYU in New York City helped make the Securities and Exchange Commission EDGAR database of corporate findings available on the Internet. One can find current weather maps for any region of the country, an on-line exhibit of items from the Vatican Library, digital copies of art works from several museums, the complete Grateful Dead lyrics, and photos of Cindy Crawford, to name but a small set of services.
305
306
PART THREE: INFORMATION TECHNOLOGY
Government agencies post RFPs (requests for proposals) to Internet servers, and contractors can file their bids electronically. There are a number of job post ings available on the network, and companies, including AT&T, list information about themselves on the Internet. Mead Data Central provides Internet access to its LexislNexis database on a subscription basis. The Internet is also used extensively to share and distribute software. Through an anonymous FTP (file transfer protocol), a user can log on to a remote computer as a user with the name "anonymous," use his or her Internet address as a pass word, and transfer files from the remote computer to a local computer over the network. Dell distributes new versions of its software via the Internet as well as through other channels. Business Week estimates there are 150 journals published electronically. Some scientists are even calling for the elimination of paper journals since the lead time for publication is so great. A large number of journals are posting their table of con tents on the Internet and some hope to provide information that is not included in the printed version. There are some 50,000 peer-reviewed technical journals, a $4 billion industry, and the threat of Internet publishing is very real to these businesses. At first, the Internet was criticized for its difficulty of use, but the World Wide Web and graphical browsers represent major breakthroughs on the Internet. Re searchers at CERN in Geneva developed the World Wide Web (WWW), which connected a group of an estimated 30,000 network servers using the Hypertext Transfer Protocol (HTTP). The Web uses hypertext links produced with the Hy pertext Markup Language (HTML) to link documents and files. Hypertext is created by placing links on words to reference other sections of text or other docu ments. Clicking a computer mouse on highlighted text results in the retrieval of a new file or document, allowing the user to browse through related pieces of infor mation. The retrieved documents may all reside on different computers, but the Web makes the retrieval transparent to the user. HTTP is a connectionless protocol, which means that each client-server connec tion is limited to a single request for information. This way, the network is not tied up in a permanent connection between the client and server. (The disadvantage is that many connections may be made repeatedly to the same server to request infor mation.) The Web is an excellent example of a client-server architecture-your computer is the client and you visit a variety of Web servers as you search for infor mation. To see an example of hypertext source documents, run your Internet Browser and click on "View" and then "Source." To use the WWW, you need a net browser. The development of a graphical Web browser is a second breakthrough, one made possible by the connections provided by HMTL and the Web. These programs work by "pointing and clicking" with a mouse; which is a vast improvement over character-based terminal access to the Internet. A browser connects users to different services, helping them navigate the confusing and disorganized structure of the Internet. You can also use browsers to create forms and facilitate the publication of data. Host computers on the Internet generally provide some form of content, infor mation that users access with their browsers. With millions of Web hosts, there is
CHAPTER 1 2: N ETWORKS AND ELECTRONIC COMMERCE
An agent is an intelligent piece of software that a user programs to perform some task. As an example, you might i nstruct you r agent to search a network for vendors offer ing a VCR that has slow motion, four heads, stereo sound, and costs under $400. The agent should report back to you the stores, prices, and characteristics of the six lowest priced versions it finds. Another useful agent would be one that took your order to buy a share of stock and hovered in a broker's network until the stock reached the indicated price. Then the agent would execute the transaction. You might also appreciate an agent that could weed out junk messages in your electronic mail box. Agents are a relatively new phenome non spawned by the emergence of net works. They appear to have a bright future making it easier for users to obtain the re sources of a network. Agents are considered to be an impor tant component of electronic commerce; they should facilitate buying and sel ling over computer networks. I n electronic com merce, you will have supply agents that
provide information to demand agents, an agent sent out with a request as described above. Sometimes agents are called "soft bots" like their mechanical robot counter parts. An agent will have some or all of the following characteristics: Autonomy. The agent takes initiative and follows its instructions without user intervention. • Goal-oriented. The agent accepts requests and acts on them; it decides how to achieve the user's goal. • Flexibility. The agent does not follow a script but decides dynamically what actions to take. • Communications capability. An agent can engage in complex communications to achieve its goals. • Mobility. The agent can transport itself from one machine to another across a network. •
While it may be a while before we have personal robots to clean house and do the laundry, software agents should be making life easier for us in the very near future.
an incredible amount of content available. To help you find information, there are over 30 "search engines" on the Web. These services, funded by advertising, ac cept your search queries and look for matching content on the Web. Figure 1 2-5 shows the AltaVista, Excite, Yahoo, and Metacrawler search engine screens. Search engines do not actually search the Web for each query; rather they search the Web at various times (the middle of the night?) and build all index of terms. When you make a query, the engines search their indexes and give you the universal resource locators (URLs) that look like http://www.stern.nyu. edu, plus a few lines of text from the page referenced by the URL. (URLs are explained in a little more detail later in this chapter.) It is interesting to note that some of the ad vertisements on search engine sites are sensitive to the query you make; the search engine tries to show you ads that match your search. The interaction with the Web described so far depends on the user's initiative; you search for and decide what sites to access. "Push" technology refers to ser vices on the Internet that come to you automatically. You can sign up with compa nies that send news and other information to your client computer on a continuous
307
308
PART THREE: I N FORMATION TECHNOLOGY
(a)
(b)
(c)
(d)
FIGURE 1 2·5
Search engine screens. (a) AltaVista, (b) Excite, (c) Yahoo, and (d) Metacrawler.
basis. Originally, push technology was developed on the Internet, but it is spread ing to Intranets as well (see below). Wheat First Union, a Richmond, VA, financial services firm, uses push technology to alert its stock brokers to important news and stock selling opportunities from large blocks of shares Wheat First Union buys several times a day. There is currently a raging debate between visionaries who see the Internet as the next era of computing and those who see the Net as an important, but not revo lutionary advance. The visionaries argue that so much information, software, and multimedia content will be available through the Internet, especially given Java's ability to share programs easily and safely, that no one will need a Pc. This group is the one that favors the development of Net PCs. Sun Microsystems, the devel oper of Java, and Netscape, a company that provides Web servers and browsers, en courage this view. The most extreme position is that the Net will lead to the demise of Intel and Microsoft as Net PCs take over. As discussed earlier, the resolution of the conflict between Net PCs and full-featured PCs is still in doubt, but right now the numbers favor large highly capable computers over net computers (NCs). The need for a net computer is in doubt as the price for capable PCs drops below $500.
CHAPTER 1 2: N ETWORKS AND ELECTRONIC COMMERCE
In summary, the Internet was launched with government subsidies for the net work and terminals that helped it become established. For most early users, the network appeared to be a free good. Early use of the network focused on interper sonal communications and the sharing of programs and information. Unlike Mini tel, academics and scientists first used the Internet. Business use on Minitel began immediately while its use is a recent phenomenon on the Internet. The Internet's open standards allowed many users and service providers to connect. The network has an open, decentralized, and extendible architecture. The Net's open culture and free exchange of software encourages users to access it and providers to offer services. Products like Web browsers (e.g., Netscape and the Internet Explorer) make it easy to use the Net. A spate of articles on the information superhighway, "cyberspace," and the Internet (including a cartoon in the New Yorker) have made a network connection highly fashionable. All of these factors have led to the criti cal mass needed for the network to succeed. Intranets and Extranets
Internet technology is having a major impact on companies through networks called "Intranets," as opposed to Internets. A firm sets up servers and clients fol lowing Internet protocols and distributes a web browser to its users. The network is probably not connected to the Internet; rather it is used to publish information internally within the company. This information is likely to be proprietary so the company does not want other Internet users to have access to it. An Intranet also provides a platform for developing and distributing applications that anyone with a browser can access. How can a company benefit from this kind of technology investment? Morgan Stanley is a major investment bank and now a retail broker since its merger with
309
31 0
PART THREE: I N FORMATION TECHNOLOGY
a VW in Mexico is com b i n i n g much of the technology we have discussed to date into a single application to serve its dealers. First, the company implemented SAP's R/3 soft ware to stream l i n e its man ufact u r i n g processes. The system coordinates a l l as pects of manufacturing and parts ordering, including supplier orders, receipt of goods, warehousing, client orders, packing, and billing for VW's Puebla plant. As a part of the $35 million project, the company is c reating an Extranet for its 200 dealers. An Extranet is an Intranet that al lows external sites access, g e n e ra l l y through a password. I n t h i s way, a com pany can take advantage of I nternet tech nology to create an on-line application that users can access from any location in the
world that has an Internet connection. The d eal ers use the Extranet to stream l i n e spare parts orders; t h e network provides access to the SAP databases from any level in the company. The turnaround time for ordering spare parts has been cut in half, which leads to both better customer and dealer relations. Dealers also can cut the number of parts in inventory, saving them money. Using an integration tool, VW was able to provide a connection to R/3 via a browser, which kept costs very low for dealers who only need a PC, browser and Internet connection. In this example, an enterprise software package has been combined with I nternet technology to produce a very successful na tionwide, on-line system.
Dean Witter. Morgan Stanley has developed an extensive Intranet containing the research information that various parts of the firm develops. By having it on the Intranet, the information is available to anyone in the company. This way, mem bers of the firm do not overlook research because it happens to be in someone's bottom desk drawer. At Chrysler, an Intranet has replaced the company telephone directory; it pro vides a photograph and job descriptions in addition to phone numbers. The au tomaker expects to use its Intranet to broadcast information around the company, monitor projects, and reduce the amount of time needed to hunt for information. The Chrysler controller collected time-sheets from his staff to see where they were spending their day and he found that the paperwork to approve equipment pur chases was taking up to 1 8 percent of some employees' time. Now a team is trying to figure out how to streamline the purchasing process using the Intranet. In addi tion, vehicle program managers post car-design changes to Chrysler's Intranet so they are instantly available. The engineering department has invested $750,000 in its part of the Intranet in an effort to link isolated systems. Using the same browser interface, engineers can move from the main software design system, CATIA, to regulatory manuals and home pages that describe how different projects are going. The minivan team home page links to a progress report on the design of a new vehicle's body and ex ecutives can check progress without calling a meeting. The Intranet should help Chrysler achieve its goal of reducing the cycle time for vehicle design to two years from the current four or five years (Wall Street Journal, May l 3 , 1997).
CHAPTER 1 2: N ETWORKS AND ELECTRONIC COMMERCE
The Internet has succeeded in confusing a large n u m be r of elected and appointed (many self-appointed) pol itical l eaders around the world. It is very difficult to regu late the Net since it is a rather amorphous collection of networked computers. United States senators and congressmen are very concerned about pornography on the Net, yet it is very hard to monitor a stream of d i g its to know that it is a pornographic image. A p rovider could simply move a server off shore, out of range of U .S. regu lations, in response to any laws trying to regulate the Net. This same problem applies to countries with regimes that try to control information available to the public, for example, the People's Republic of China and Saudi Ara bia. In Saudi Arabia, Net users have ex plored topics like sex, religion, and politics-
all subjects not often discussed in public. The Saudis are caught in a bind. They want to become technologically sophisticated but are concerned about the ability of the Net to undermine their strict reg i m e . Busi ness leaders want access to the Net, making it difficult to restrict its use. Thousands of Saudis dial into the Inter net in neighboring countries or through the U.S. They debate taboo topics from atheism to pornography beyond the reach of authori ties. Even fundamental ists debate with Western atheists over the Net. The Gulf so cieties are very closed, so the idea of a free exchange of ideas tempts a lot of residents. The Internet has made possible some thing that would be very dangerous to do in a group of people, by voice on the phone, or on paper. Its impact on governments will be fascinating to watch over the next decade.
Intranets have the potential to tie together employees in an organization and dis parate information systems as well. As firms create links between Intranet stan dards and legacy transactions processing systems, it is possible to envision an envi ronment in which the major desktop application for each user is a browser. Using the browser and Intranet, an employee accesses all types of corporate information along with the data from internal proprietary information systems in the company. It is also possible to provide external access to an Intranet so that customers and others can access your internal servers. An Extranet use the Internet technology to provide on-line access to your internal net servers, g nerally through a pass word for each external user. With an Extranet, you can reate an on-line system very quickly since you are taking advantage of the existin worldwide Internet.
1
THE POTENTIAL OF ELECTRONIC COMMERCE
With the opening of the Internet for profit-making activities, thousands of compa nies set up "home pages" on the Web. A home page is a starting place for some one seeking information. For example, you can create your own personal home page that gives a reader information about you. AOL and other services help you create and store your home page, or you can use Microsoft Word, a hypertext edi tor that comes with a Web browser, or a specialized product like Front Page. Similarly, companies create home pages with links to other information. Fig ure 1 2-6 shows the home page for GE Plastics along with two pages accessed
31 1
31 2
PART THREE: I N FORMATION TECH NOLOGY
(a)
(b)
Datasheets . �J,i. II f:;'/f.!,i' ' ''''-''' , .-
Eug;f1eeling thtfllloplastic� an: characterik¢d and defined by their Pl'QPerne:;, E<wb $pecifit.: resin grade
bWl iro ownplXlpertyprofile th
(c) FIGURE 1 2-6
GE home page (a), leading to GE Plastics home page (b), with link to database of characteristics of more than 500 plastics (c).
through links on the home page. This particular set of pages is well designed. The user can quickly access technical information about GE Plastics. A URL or universal resource locator is an address or link to a page on the web. These links begin with http://. Sometimes the II is followed by www, a period, and then the address of the individual or company. For example, the home page for the Stern School is found at http://www.stern.nyu.edu. What opportunities does the Internet offer for electronic commerce-for facili tating trading relationships among companies and between individual customers and companies? There are a number of ways companies use the Net, including: •
• •
As a universal electronic mail system. Various proprietary systems all have "gateways" to the Internet. If you use America Online and friends are on the In ternet, you can send mail to them even if they are not subscribers to AOL. As a source of information on a company and its products. As a portal that allows customers to enter orders and make inquiries. Figure 1 2-7 shows the Federal Express pages for letting customers inquire about the status of
CHAPTER 1 2 : NETWORKS AND ELECTRONIC COMMERCE
,fi!!!!l mw
�)'!'1Jm .f�.:f�'�'�'''J ''
Trussl1elSp!ot,et,dbycopyngbtond_1awsunder U Z andmt,mal1ona1law
Chck, print andshipI F_e,lJ;., �NeI�JJjp:;Y!makes !l; easy to prepare your shipments while you're online. You can prepare lm
Allngbtsre."""d
(a)
�aybills
and
a
_
(b)
(c)
,
¢ Al:"mml at FedEr DettinaIion ltltation HILLSIDE IL 04!0806:38 Ldl:FeliEx SIltt FacilityNE'WARXNJI)4II)8 01:32 ¢ Ld'tFedExSortFatili$yNEWAltKNJ04I0823:19 ¢
Q L(!ftF�dEx SIlrt:Fari.!ityNEWARKNJ{t4j{I113:22 {> Ldtll'fldlb:; QriginLontiImNEWYORXN\04I01
111:52 " l'l.clteuJ.qINEWYORKNY0c001lA:J1
• Delivere d T o :
HINSDALE IL
• Delivery Location : • Delivery Date : Q4!08
• Delivery Time : 08:36
• Signed For By: R. HALL
• Status E�c�ption : Release .ignature onflie
(d) FIGURE
(e)
1 2·7
FedEx home page and package tracking screens.
31 3
31 4
PART THREE: INFORMATION TECHNOLOGY
•
•
•
•
a package. Using a "forms" program, Federal Express lets the customer input a package identification number; then the FedEx Web server looks up the status of the package and displays it for the customer. Customers can also use a Web appli cation to enter shipping orders. FedEx gives large clients software to link to its tracking computers. Customers now do 60 percent of package tracking using a software connection to FedEx's tracking computer and/or the Web connection. The site receives over 400,000 "hits" a day, and 20 large servers respond over a variety of lines including a T3 and two T1 lines. There are also two servers that form a bridge between the Web site and FedEx's S/390 mainframes, which host the company's shipping database. Some 2 million of the company's 3 million daily packages are shipped or tracked on the Web or through FedEx's Windows' software over a proprietary network. As a way to distribute software. Hewlett-Packard uses its Web site to distribute revisions for its Unix operating system and new software for its printers. Cus tomers download the software using the Web. As a way to give customers information about their relationship with the com pany on the Web. Wells Fargo Bank in San Francisco gives customers Internet access to the transaction histories of their checking and savings accounts as well as information on current balances. As a source for electronic data interchange. The CommerceNet consortium de scribed earlier in the chapter provides an example of using the Internet for EDI among companies. For the purchase and sale of goods and services. This kind of Internet applica tion is growing rapidly. Dell computer sells over 1 4 million dollars worth of computers a day from its Net site. See Figure 1 2-8 for a view of Dell's computer configuring page.
FIGURE 1 2·8
The Dell configuration page for buying a computer.
CHAPTER 1 2 : NETWORKS AND ELECTRONIC COMMERCE
The Nature of Markets
Markets serve a number of important functions: They match buyers and sellers and facilitate the exchange of information, goods, services, and payments associated with transactions. They provide an institutional infrastructure subject to legal and regulatory constraints, which are in place to encourage efficient and fair market operations (Bakos, 1998). Electronic commerce affects all these characteristics of markets. In particular, e-commerce tends to increase the personalization and cus tomization of product offerings. Technology for tracking consumers helps the mer chant identify individual buyers to analyze their preferences and offer appropriate goods or services. Customization is particularly appropriate for information prod ucts like an electronic newspaper, which can be customized to the tastes of each individual subscriber (Bakos, 1998). Electronic markets also affect the buyer's search costs and facilitate price discovery; it is very efficient to obtain and com pare products and prices using the Internet. Table 1 2- 1 divides Web commerce in two categories: transactions that favor the vendor and those that favor the customer. The first category is the retail customer purchasing from a vendor, as we saw with Dell. If the customer goes to Dell with out any comparison shopping, the transaction clearly favors Dell, the vendor. Other examples of well-known companies that sell on the Web include West Ma rine and L. L. Bean; the Net fits nicely with a mail-order toll-free phone line busi ness model. Please see Figure 1 2-9. An auction via the Internet provides a convenient way for a vendor to reach a large number of affluent customers. Cathay Pacific airlines runs frequent ticket auctions . One auction drew nearly 1 5,000 bids for tickets from New York to Hong Kong, and some winning bids were as much as 60 percent off the regu lar round-trip fare. See Figure 1 2- 1 0 for the bid site. American Airlines will no tify anyone by e-mail who registers about special fares for each weekend. This
TAB LE
1 2-1
TYPES O F ELECTRONIC COMMERCE
Electronic commerce favoring the vendor
Vendor locks in customer; e-commerce makes it eSlsier to do business with the vendor
Customer orders from one vendor directly without comparison shopping using the Web
Vendor provides ability for customer to find enough information about the product to make a purchase and offers merchandise on the WHb
Customer makes a bid
Vendor runs an auction of merchandise
Electronic commerce favoring the customer
Customer uses Web for price discovery, comparison shopping, requesting bids
Customer conducts own search of Web to compare products and prices
Company rElsponds with its products and prices
Customer searches for multiple vendors using agents or electronic brokers
Company responds with its products and prices
31 5
31 6
PART THREE: INFORMATION TECHNOLOGY
w
�
FIGURE 1 2·9
L.L. Bean (a) and West Marine (b) home pages.
Asia Unlimited S\l\{l'!ffJ�ns,bll(!!lS Winners thanks to aU the 68,244 indlviduats
who ehttt$d the As!a Unlimited SWeepstake-s,
The usernames cfth. 10 lucky winners are- as follows:
FIGURE 1 2· 1 0
Cathay Pacific Internet auction sweepstakes.
approach helps the airline sell seats that otherwise might be empty. These auc tions favor the vendor who is trying to distribute a product or service. Transactions favoring a customer involve using the Web to do research. A cus tomer uses the Web to perform comparison shopping among suppliers. She might also use an electronic broker, for example, AutobyTel, which submits her specifi cation for a new car to several dealers and reports back the best offer. The Web has helped the customer obtain information about products and services and assisted in price discovery. This process favors the customer who is now able to contact many firms in the electronic market. A number of comparison shopping brokers now exist. Junglee.com, a subsidiary of Amazon. com, will help you locate the best
CHAPTER 1 2: N ETWORKS AND ELECTRONIC COMMERCE
FIGURE
1 2·1 1
A price comparison for jeans on Amazon.com's Shop the Web web site.
Companies like Dell Computer and Cisco Systems have experienced incredible sales g rowth rates from t h e i r Web sites. Of course, we need to remember that their cus tomers are buying computer and network equipment and thus represent a group that is comforta b l e o r d e r i n g over the W e b . FedEx has over 500,000 customers using its package tracking application and esti mates it saves $3 for each hit compared to a phone call. Cisco estimates savings for customer support in one of the early years of I nternet usage as follows: $ 1 25 million by using the Web to communicate with customers
$85 million by distributing software on the Web, some 40,000 downloads a week $50 million by having documentation on-line The total savings amount to $268 million. Over 60 percent of Cisco's customer trans actions use t h e Web, some 2 5 0 , 000 a month. The result is that 500 fewer employ ees are needed for taking orders and provid ing customer service. At the same time, the firm is providing customer service that is more convenient than waiting on the phone for a representative. While these savings are only estimates, they suggest that it is possi ble to make money through the creative use of the Internet.
prices for items you wish to purchase. In contrast to Dell's site in Figure 1 2-6, which features only Dell products, Junglee will look across the net for prices from different vendors. See Figure 1 2- 1 1 . In addition to retail commerce, there are many business-to-business Web transactions. Here, we include EDI and Web ordering. Most EDI is done through
31 7
318
PART THREE: INFORMATION TECHNOLOGY
non-Internet systems, though groups like CommerceNet are working to make the Web easier to use for this application. Web ordering is similar to retail, but in volves company-to-company sales. A good example is Cisco Systems, which makes about 80 percent of the routers used with the Internet. This company is selling over $3 billion a year of its equipment to companies from its Web site; nearly 40 percent of its orders come through the Internet. The rapid growth of its Web order volume has led Cisco's chief executive to forecast that the Internet will have $ 1 trillion in sales by 2000, much higher than the previous high fore cast of $300 billion. (Of course, his sample has a lot of bias since it is likely all of Cisco's customers use the Web on a regular basis.) See Figure 1 2- 1 2 for Cisco's Web site. While the Web appears to be a promising channel for sales, it is by no means free for the merchant. Firms spend heavily to attract the consumer's eye. One sports company is paying $23 million for a three-year agreement with America Online to promote its merchandise on this Internet service provider's portal to the Web. The 1 -800-Flowers Web site needs two major rebuilds a year to keep pace with technology changes and the competition. A physical store might need an upgrade once every three to four years. However, benefits come in the form of volume and profits. The 1 -800-Flowers Web site in 1 998 accounted for 1 2 per cent of company sales, amounting to $30 million. Eddie B auer in 1 998 had rev enue from its Web site that equaled the revenue from eight to ten physical stores. The Web site employs nine people while each store employs about 25. About half of the buyers at the site are new to Eddie B auer, so it is not just taking sales from stores or the toll-free catalog operation. While there are high expenses for electronic commerce, these merchants are finding benefits and profits from their Web sales.
FIGURE
1 2·1 2
Cisco product ordering page.
CHAPTER 1 2: N ETWORKS AND ELECTRONIC COMMERCE
The I nternet helps to provide a "level playing f i e l d" between small and lar�le f i r m s . Through a Web presence, a small business can generate worldwide sales whEm it could never afford to have a global sales force. The Great Southern Sauce Co. has annual revenue under $500,000, but it has a Web presence to sell more than 50 sauces.
The College Depot has only two full-time employees and $1 00,000 a year in sales. Its presence on the Web looks as professional as that of a b i l l i o n d o l l a r corporati o n . Through the Internet, i t can offer over 50,000 specialty products for college students. A home on the Net is more important than a physical home for companies like these.
The Great Southern Sauce Company's home page.
College Depot's home page.
31 9
320
PART THREE: I N FORMATION TECHNOLOGY
Transaction-cost economics describes a continuum for how a company acquires assets, ranging from the market to a hierarchy. A firm uses a hierarchy, for exam ple, by making an asset itself or by going directly to a supplier rather than the mar ket. A complex product or one that is difficult to describe is hard to buy in the marketplace. In fact, there may be a limited market for the product and very few producers. A market may not exist or the costs for using it are so high that the company uses other means to acquire the asset. At the other extreme, when there is a robust market, the firm will generally encounter low transactions costs and will choose to participate in the market. Table 12-1 suggests that electronic commerce may be used to reinforce either hierarchy- or market-based transactions. Electronic commerce favoring the vendor in the top half of the table leads toward hierarchy; the customer is going directly to the vendor without exploring the market. In the bottom half of the table, electronic commerce encourages buyers to enter the market. The content on the Internet re duces the firm's search costs in using a market and should encourage the customer to search rather than accept the first offer. The communications capabilities of the Web reduce the cost of obtaining information and bids from multiple vendors. The ability to purchase over the Net also reduces transactions costs under conditions of both hierarchy or market. The Internet is likely to change long-standing businesses. We expect there will be widespread "disintermediation"; that is, the number of market intermediaries will be reduced. Various kinds of sales firms may find themselves losing market
CHAPTER 1 2: NETWORKS AND ELECTRONIC COMMERCE
321
share to the Internet. Will houses be purchased over the Net, disintermediating the real estate agent? Currently you can obtain bids for cars over the Net, but you still have to visit the dealer. Will manufacturers start to sell directly over the Net and only maintain a dealership for service? Offsetting the loss of intermediaries will be the rise of electronic brokers. You provide Auto-by-Tel with a detailed description of the car you would like to buy via the Internet or phone, and it solicits bids from dealers who pay it a fee for the lead. It is clear that the Internet is a tremendous vehicle for change. The range of applications for the Net seems only limited by your imagination and creativity. A relatively high-speed network that spans most of the globe is available at a very reasonable cost. What will you do with it? New Business Models
The Internet enables a number of new business approaches that have the poten tial to restructure business and commerce. Dell Computer has used technology to create a different model for building and selling PCs. First, Dell was only a direct seller, using toll-free numbers or its Web pages. It has built custom Web pages for select customers and has a large number of foreign Web sites for or ders. Communications technology lets Dell build computers to order, pulling parts from its suppliers only after having received a firm order for a computer. In addition, communications technology lets Dell coordinate closely with compo nents that it does not build itself. If you order a Dell computer, all the parts will likely arrive on the same day because the various carriers are also connected
In April 1998, Dell' s on-line sales reached $5 mil lion per day and by 1999, $14 million, and the capa bility is being embraced by a wide range of cus tomers. Savvy consumers and home-office computer users were early adopters, but institutional cus tomers are buying desktop and notebook computers, workstations and servers via www.dell.com in in creasing volumes, as well. And the scope of Dell ' s Internet business is global. Though the majority of the company' s cur rent sales through www.dell.com are within the U.S., sales from other markets grew to 20 percent of the company' s on-line total in less than one year. To date, about 20 percent of the more than 2000 special ized Dell Internet sites created for large corporate customers are for companies based outside of the U.S., and there are versions of the company' s Web site in 35 countries.
The company' s increasing ability to sell com puter systems via the Internet has earned Dell a good deal of attention. However, the potential of the Internet to simultaneously help increase customer satisfaction and lower operating costs is equally compelling. Customers visiting www.dell.com can configure, price , and order computer systems-and much more-24 hours a day, seven days a week. They can get current order status and delivery information. They have on-line access to the same technical refer ence materials used by Dell telephone-support teams--45,000 service and support items sorted and presented by system model. Internet-based services are convenient to customers and reduce the number of telephone calls to Dell for such information freeing support employees to provide higher-value serVIce.
322
PART THREE: I NFORMATION TECHNOLOGY
The conventional PC builder buys raw materials, builds computers for inventory, and Inventory
Inventory
ships when it receives an order from a customer, or ships to a retail store to go into stock.
Dell orders raw materials and builds a computer when it receives an order, immediately shipping the computer to the customer, Other partners ship accessories directly to the customer.
FIGURE 1 2-1 3 A new business model for building pes,
electronically, Different vendors supply speakers, printers, parallel cables, and external storage devices while Dell sends the processor, monitor, keyboard, and mouse, The Web also provides after-sale service, making thousands of pages of system documentation and trouble-shooting information available to customers, Dell has used technology to become a highly efficient manufacturer with mini mal raw materials and almost no finished goods inventory. See Figure 1 2- 1 3 , As of this writing, Dell had half the sales of Compaq, but a market valuation that is 25 percent higher than Compaq! Another model is seen in Amazon,com, the Internet bookseller, Amazon pro vides customers with information about books, CDs, and videos, It accepts orders and credit card payments over the Internet, and forwards these orders to a com-
CHAPTER 1 2 : NETWORKS AND ELECTRONIC COMMERCE
pany to which it has outsourced order fulfillment. A few weeks after the purchase, the customer receives e-mail from Amazon suggesting new titles related to his or her purchase. What is different about this model? Where is Amazon's inventory? It is, of course, virtual. Unlike booksellers with a physical location, Amazon receives payment before it has to pay for goods sold. A bookstore in a neighborhood mall buys books and displays them before a purchase, tying up substantial sums in a re tail inventory that Amazon does not need. Increasingly, companies are outsourcing manufacturing and service operations to other firms because the outsourcer can do the job better and/or for less cost. Many products sold today under brand names are really built by subcontractors or outsourcers. Communications over networks makes it possible for these out sourcers to look as if they are a component of your firm, giving rise to the "virtual organization." The Amazon model works well for low-value, small items like books and CDs. What about the purchase of large expensive products like a new car? An increasing number of orders for cars come through services like Auto-by-Tel, and dealers report that customers come into their showrooms much better in formed about cars than ever before. It is not unusual for a customer to have a copy of the manufacturer's suggested retail price and the dealer's invoice price to use in bargaining. In the future, will there be a few central locations to see and drive a car, with ordering and delivery through the Internet? Will dealerships exist primarily to provide after-sales service? Auto-by-Tel is an electronic bro ker, matching buyers and sellers of cars. There are similar new businesses on the Web that perform comparison shopping for a user or that operate electronic auc tions for different products.
323
324
PART THREE: I N FORMATION TECHNOLOGY
As we saw in Chapter 6, the Internet also lets every firm, no matter how small, undertake international sales. A business with a handful of employees can sell to the world from its Web site without having a sales force or representatives travel ing the globe. There are many different financial exchanges or markets. For hundreds of years, these markets have relied on individuals meeting on a physical exchange floor at a central location. The NASDAQ market was one of the first securities ex changes that did not have a physical location. Market makers use the NASDAQ system to enter their bid and ask prices. Individual customers, however, still have to trade through a broker. There is increasing movement toward electronic, global, and continuous time markets without any physical exchanges. While the existing exchanges are moving cautiously, entrepreneurs are taking advantage of technol ogy to create electronic markets that function without specialists or market mak ers. The Paris futures exchange closed its "pits," where traders met physically, eight weeks after introducing screen-based trading. We expect that many markets will migrate to the Internet. Companies will list their shares globally and trade around the clock. The huge increase in electronic brokerage accounts has motivated the markets to think about electronic exchanges; it has also frightened traditional, retail broker age firms . From 1 996 to 1 998 the number of on-line brokerage accounts grew from 1 .5 million to over 5 million. These on-line accounts make up a quarter of re tail stock trades through more than 70 Internet brokers who offer trades, stock quotes, and research at low prices. Investors, however, still have to route their elec tronic orders through a broker even though they may wish to access the markets di rectly themselves. If this happens, the impact on full-service brokerage firms will be profound. Investment banks make high profits from IPOs (initial public offerings). Who will gain these profits if the IPO's stock is sold through an electronic auction? The Association for Information Systems is a small professional organization of faculty who teach information systems throughout the world. AIS publishes two electronic journals, the Communications of AIS (http://cais.aisnet.org) and the Journal of AIS (http://jais.aisnet.org). The association could never afford to pub lish even a single journal if it had to follow the traditional model of printing, bind ing, and mailing each issue to members, but through the use of a Web server and passwords for members and other subscribers, it is economical to publish the jour nals. Traditional publishers of textbooks like this one are offering electronic ver sions and believe that eventually, they will phase out printed copies. Networks and the Internet provide an incredible resource for developing new business models. Existing firms must continually reevaluate their businesses be cause these networks offer opportunities for radically new approaches to the way the firm operates. CHAPTER SUMMARY 1. The telephone network offers great ubiquity and connectivity. Computer net
works are striving to be easy to use.
CHAPTER 1 2: NETWORKS AND ELECTRONIC COMMERCE
2. A company that wants to develop a network is faced with a variety of choices. In many instances large firms have designed their own proprietary networks. 3. The common carriers are offering services that make using a network feel just like using the phone system. In this service, a common carrier is used for al most all parts of the communications. 4. Industries have tried to develop standards for ED!. The electronic interchange of information is expanding rapidly in industries such as retailing, transporta tion, and insurance. S. There has been much talk of a national network infrastructure or "information superhighway." The French Minitel system was the first example of an infor mation highway, and it offers a number of options for businesses. 6. The Internet, based in the U.S., is a network of networks. The development of the World Wide Web and browsers has contributed to the exponential growth of the Internet. 7. Companies provide a great deal of content on the Web, ranging from informa tion about themselves and their products to sites that allow customers to order products directly from them. 8. Intranets offer a firm the ability to make information and knowledge available to all employees. They also provide a platform for developing different kinds of applications that help coordinate activities in the organization. 9. Electronic commerce is a new and exciting way of conducting business. Elec tronic markets will become more common because of the Internet. 10. Networks provide connectivity. They help transform the organization by con necting it to customers, suppliers, and alliance partners. The impact of greater connectivity will be to increase the pace of change in organization structure. 11. The combination of computers, networks, and databases enables new business models that offer many opportunities for managers. These new models are characterized by very fast response times and high levels of efficiency. IMPLICATIONS FOR MANAGEMENT
The last part of the twentieth century will go down in history as the decade of the network. The Internet has exploded during this period, moving from a network consisting primarily of educators and researchers to one of business applications. The Internet offers companies the ability to provide multimedia information to in ternal employees, customers, and anyone else interested in the firm. As a manager, networks in general and the Internet in particular offer you another powerful tool for managing and communicating information. This technology reduces the im pact of distance and time while dramatically increasing the speed of access for in formation. The ability for users to interact with the Net means they can search for information and order products through the Internet. The Internet is rapidly be coming the mechanism for connecting organizations and individuals throughout the world.
325
326
PART THREE: I N FORMATION TECHNOLOGY
KEY WORDS
Agent America Online ANSI X. 1 2 ATT Worldnet Auction Browser CommerceNet Compuserve Computer network EDI Electronic commerce Home page HTML (hypertext markup language) HTTP (hypertext transfer protocol) Microsoft Network Minitel Netscape Network TCP/IP Ubiquity World Wide Web RECOMMENDED READING Bakos, Y., "The Emerging Role of Electronic Marketplaces on the Internet," Communica tions of the ACM. 4 1 , no. 8 (August 1998), pp. 35-42. (A major section of this issue is devoted to information systems and economics.) Kambil, A.; and J. Short. "Electronic Integration and Business Network Redesign: A Roles-Linkage Perspective," JMIS, Spring 1994. (A study of the impact of one network on business.) Lucas, H. c., Jr.; H. Levecq; R. Kraut; and L. Streeter. "Minitel: The French National Infor mation Highway," IEEE Spectrum. November 1995, pp. 7 1-77. (The story of Minitel.) Zaheer, A.; and S. Zaheer, "Catching the Wave: Alertness, Responsiveness, and Market In fluence in Global Electronic Networks," Management Science. 43, No. 1 1 (November 1997), pp. 1493-1509. (An interesting article looking at the requirements for success in global currency trading, which amounts to over $ 1 trillion a day, approximately 50 per cent of which takes place over the Reuters network.)
DISCUSSION QUESTIONS 1. What
advantages does the telephone system offer as a model for a network? companies developed so many proprietary networks? 3. Why are EDI standards hard to develop? Why will one standard not serve many differ ent industries? 4 . What industries are most likely able to take advantage of EDI? 2. Why have
CHAPTER 1 2: NETWORKS AND ELECTRONIC COMMERCE
5. How do networks contribute to the development of the T-Form organization? 6. What IT organization design variables are affected by networks? 7. What is the appeal of a mass market network? 8. What services to business do mass market networks offer? 9. What are the problems with completing transactions over these networks, that is, pro-
viding your credit card number after ordering merchandise? 10. Why has the French Minitel system been such a success? 11. What was the role of the French government in developing Minitel? 12. Describe the World Wide Web. How can a word or phrase in something you are read
ing on the screen result in your being connected to another computer that has more in formation about that term or phrase? 13. Why are people putting so much information on the Internet, information that they are not likely to ever receive payment for from readers? Is this behavior strange from an economic standpoint? 14. What is a Web browser? How have browsers contributed to the growth of the WWW? 15. Pick a specific company, and describe how it might make use of the Internet. 16. What is an Intranet? What is its role in an organization? 17. The first electronic filing of tax returns was plagued with fraud. How do you think one could defraud the system, and what could be done to prevent it? 18. What is the role of the government in stimulating the development of a national net work infrastructure? 19. The Internet reaches most countries in Europe, Asia, and the Americas. Connections are more spotty in the Middle East and Africa. What are the implications today for a country being "off the net"? 20. There are concerns over pornography on the Internet, while authoritarian countries worry about the free flow of ideas on the Net. Is there any way to regulate information content on the Internet? Is it desirable to do so?
327
CHAPTER 1 3
I
I
Outline What Is Hardware and Software Architecture? Mainframes for High Volume The Midrange Computer Is (Usually) Smaller The PC Is Totally Different How Do You Share? Power to the Desktop with a Friendly Interface Moving toward the Client-Server Model What Is Infrastructure? The Advantages and Disadvantages of Standards
Examples of Different Architectures Competitive Reservation Systems Travelocity: Interfacing a CRS to the Web A Broker Workstation Chevron Canada Client-Server Model Comparing the Applications
Matching Design to an Architecture When the Architecture Is a Given Suggested Guidelines Dealing with the Problem of Data
Contemporary Trends in Architecture
Focus on Change
The basic architecture of the firm will influence the kind of systems that are devel oped and the linkages it develops with other organizations. A firm wants a flexible 328
CHAPTER 1 3 : INFORMATION TECHNOLOGY ARCHITECTURES
architecture to support a variety of technology initiatives. In today's environment, this architecture is likely to include networked workstations on the desks of most employees, larger computers on the network for processing transactions and shar ing large databases, and Internet, Intranet, and Extranet access. As you read about airline reservation systems, broker workstations, and the Chevron client-server ar chitecture in this chapter, think about the potential of these architectures to enable dramatic changes in organizations. •
In the early days, designers were advised to develop systems without consider ing the hardware or software that would be used to run the system. Design, after all, should be independent of hardware and software. Of course, available hard ware and software had to influence how a system would operate. For example, a designer could not design an on-line system if the computer running the system was capable only of batch processing. Beyond gross characteristics such as batch or on-line, however, design could be independent of hardware and software. Part of the reason for this independence was that designers worked with mainframe computers of differing sizes. In the 1 970s, minicomputers became very popular as departmental machines or comput ers came to be used in applications where the power of a mainframe was not needed. Most minicomputers came with time-sharing operating systems, and the natural tendency was to design on-line applications for them. In the early 1 980s the personal computer proliferated and changed the way users thought about information systems. Extremely sophisticated and powerful packages are available for these computers. The packages feature elaborate graphi cal user interfaces with pop-up windows, mice for input, multiple windows on the screen, and so on. Personal computers made users more familiar with computing and raised their expectations about how information systems should perform. They also created a lot of dissatisfaction with mainframe and minicomputer systems de veloped in-house by the firm's own staff. Clearly, the task of developing the architecture for an organization's computing system is difficult. If an organization is starting from scratch, one could conceive of buying a large computer, a midsized machine, or a network of personal comput ers. The question of which option to choose may require a major study and consid erable effort. The organization that already has a number of computers in place must decide how to manage and expand its systems as users come up with new needs and ideas for computing.
WHAT IS HARDWARE AND SOFTWARE ARCHITECTURE? Architecture is the place where all the technical topics we discussed so far come together. An organization's architecture includes:
• Computers, often of different sizes from different manufacturers. • Operating systems, frequently more than one.
329
330
PART THREE: I N FORMATION TECHNOLOGY
• • • •
Languages for developing applications. Database management programs. Packaged applications software. Networks ranging from those within a department to an international, private network to the Internet.
Beyond the technology, architecture also includes considerations of the way the organization processes information, particularly at the location processing takes place. We might ask the following questions to characterize a firm's architecture:
• Where is processing done? What computer among a group of computers processes information?
• Where are data stored for access by users? • Where are data updated? • What is the user interface? Where do the interface programs run, on which computer?
• What capabilities for data analysis does the user have? Is there local intelligence at the workstation level?
• What networks are in use, including Intranets and Extranets? • What is the firm's presence on the Internet? Just as there are many types of buildings, there are different types of informa tion systems architectures. Table 1 3 - 1 provides examples of five architectures that are fairly easy to characterize. There are also many examples of mixed architec tures, but generally they include the ones listed in Table 1 3- 1 . Table 1 3 - 1 characterizes architectures according to several criteria:
• Volume of processing. The volume of information processed may determine the kind of architecture needed.
• Database. The amount of data storage available on each class of computer is increasing, but in general more data still can be stored on larger computers.
• Inteiface. What kind of user interface is generally associated with a given option? • Number of users. How many users can the architecture support? • Discretion. How much processing and ad hoc analysis can the user do on his or her own? Mainframes for High Volume The first option in Table 1 3 - 1 is the mainframe, the traditional machine for de veloping applications. Today mainframes are used for very high-volume trans actions processing. American Express authorizes purchases for holders of the American Express card when a merchant calls to determine if American Express will agree to the charge. This high-volume application to access credit records and decide on approving the charge resides on mainframe computers (see Fig ure 1 3 - 1 ) . Mainframes are also associated with extremely large databases. I t i s not un usual for organizations such as banks and insurance companies to have data files
CHAPTER 1 3: I N FORMATION TECH NOLOGY ARCHITECTURES
TABLE
33 1
1 3-1
TYPICAL ARCHITECTURES
Number ofusers
Discretion
Simple character-oriented
Large
Limited
Medium to large
Simple character-oriented
Moderate number
Limited
Medium to small; user may input and download all data Medium to small; download capability Small to large
Elaborate workstation
One at a time
Extensive
Elaborate workstation
Multiple
Extensive
Elaborate workstation
Multiple
Extensive
Option
Volume
Database
Interface
Mainframes
High-volume transactions processing Medium-volume transactions; designed for OLTP Low
Large
Midrange, fault-tolerant
PCs and workstations
LANs
Low to medium
Client-server
Varied
FIGURE
1 3-1
The mainframe and midrange architecture.
that contain many billions of characters (gigabytes) or even trillions of bytes (tera bytes). These firms have entire rooms filled with disk drives containing important data that are on-line for inquiry and updating. Mainframe applications typically feature a large number of users of the data. These machines are designed to manage huge communications networks in which users using remote terminals access the mainframe and its databases . However, what the user can do is fairly limited. Typically, certain functions are
332
PART THREE: I NFORMATION TECHNOLOGY
made available to each user. Although it is theoretically possible, most main frame systems do not provide extensive data manipulation features to users. Thus, the user's discretion is often limited. However, in transactions processing applications, designers usually do not want the user to have more than limited ca pabilities. It is not a good idea for a reservation agent to analyze flight data; that job should be done by the marketing or operations department of the airline. The transactions processing system is an operational system, not a system for analysis and reflection. As discussed in Chapter 8, it appears that manufacturers of mainframes and minis are rushing to develop large computers that consist of multiple versions of popular chips. A good example is NCR, a former subsidiary of AT&T spun off to its stockholders , which is selling mainframes that consist of groups of Intel processors. NCR says that a unit of processing power on its new multiple-chip ma chines costs about one-eighth of what the same unit costs on one of its conven tional, old-line mainframes. The Midrange Computer Is (Usually) Smaller Much of the previous discussion also applies to the second option in Table 1 3 - 1 , except that a minicomputer or midrange system generally processes lower vol umes of data and smaller databases. The demarcation between mainframe and midrange, however, is not always easy. Some midsized computers with extremely high transactions processing speeds are designed specifically for on-line transac tion processing (OLTP) applications. Midrange computers are also used exten sively in data communications systems. To enhance the attractiveness of midsized computers in OLTP, several vendors introduced the concept of fault tolerance, or fail-safe operations. Tandem, pur chased in 1 997 by Compaq, manufactures a line of computers called NonStop each component is duplicated and all data are written to two different disk drives. Because organizations tend to depend on their OLTP applications, fault-tolerant computers are very attractive. The New York Stock Exchange uses a number of Tandem computers for processing transactions, and the American Stock Ex change uses a Stratus computer, another fault-tolerant machine, to update stock quotations. The PC Is Totally Different When the personal computer first arrived, users treated it as a computer that be longed to them. Much of the early motivation for using PCs was to get away from the traditional information services (IS) department. The IS department has the reputation of being unresponsive and slow to develop applications, and with their own computers, the users could become independent of IS (see Figure 13-2). At first there was hardly any software for PCs. But entrepreneurs soon saw tremendous opportunities in the eventual market of millions of computers with each owner buying their package. Of course, the package for the PC had to be a lot different from the package for the mainframe or mini. First, a user who was not a technology professional would evaluate and use the PC package. The program had
CHAPTER 1 3 : I N FORMATION TECHNOLOGY ARCHITECTURES
FIGURE
1 3-2
A personal computer architecture.
to be easy to use with a pleasant interface, giving rise to the term "user friendly," as opposed to "user-surly" in-house custom systems. The packages had to be easy to use because the vendor could not afford to provide training for a package that cost less than $500. Users controlled the first PCs and generally entered their own data for analysis. The most popular uses of PCs are word processing, spreadsheet analysis, presenta tion graphics, and database management, though the number of applications pack ages continues to expand rapidly. User control not only frees the user from de pendence on the systems staff, it also provides extensive discretion as to what program runs at what time on a computer. Since the computer is not shared, the user can choose when and what to run and has unheard-of freedom. Of course, the PC seemed too good to be true. The first problem that came up was that users wanted data that were not easily available. The user might have data provided on a mainframe system, but could not get a machine-readable version of the data to the Pc. Many organizations found users had to key into a PC data pro duced by a mainframe program. This inelegance led to the development of PC-to-mainframe links-combinations of hardware and software used to establish a physical connection between the PC and a mainframe or mini. Just having a connection, however, is not enough. The user must be able to access mainframe data, which are likely to be stored in a way never intended for this type of access. What is the solution? One answer is to have IS con sultants who help users obtain the data they want from the mainframe and download it to their PCs.
333
334
PART THREE: INFORMATION TECHNOLOGY
The user now is once again dependent on the IS staff, at least to obtain data. The user still has the discretion as to what programs to use and when to use them once the data are on the PC. Over time, the PC has become more integrated with the rest of the hardware and software in the firm. How Do You Share? As users work with their PCs, they develop new ideas for how they can be used. Within departments, the idea of sharing became popular: Why not share common data, expensive devices like laser printers, and so on? The local area network (LAN) makes this possible. The LAN enables users to share data through a special PC that is a dedicated file server (Figure 1 3-2). Consider the pharmaceuticals firm that buys data from an international service that collects information about the sales of prescription drugs. The pharmaceuticals firm is located in New Jersey and the database of market data is in Europe. To reduce access costs, once each quarter when the database is updated, a large extract is loaded onto the file server of a LAN in the marketing department at the pharmaceuti cals firm. Whenever a marketing analyst wants data, he or she downloads it from the file server to a PC for further analysis. All this activity is made possible by the LAN. Now the PC can serve multiple users who want to share data. Some companies have developed applications that looked originally like candidates for a midrange system by using a LAN. Given present technology, there is some overlap at the boundaries for all the options in Table 1 3 - 1 . Some OLTP systems on mainframes can run on midrange machines; some midrange applications can run on LANs.
CHAPTER 1 3: I NFORMATION TECHNOLOGY ARCHITECTURES
Power to the Desktop with a Friendly Interface The major trend we can see in architecture over the past three decades is computa tional power moving from a central computer facility to the desktop. The days of batch processing, where the user sends data to be keyed for the computer, gave way to on-line systems where users had terminals for entering transactions. Termi nals spread to those who did not necessarily input a lot of data but needed to ask questions and make queries of the system. The personal computer made it possible for users to develop some of their own solutions to problems, but the user soon saw the advantages of being networked. At some point, we will not know or care which computer is working for us. The workstation on our desk will provide an in terface to a large network of computers. Some computers will have special pur poses; for example, a large machine may be in charge of the database while spe cialized processors perform the role of file servers. All this computing power will be delivered to your desktop, completing a movement that began when the first on-line systems were developed in the 1 960s. Moving toward the Client·Server Model To further complicate matters, there is no real need to have a pure architecture. In fact, many organizations already have or will move to mixed architectures, we pre dict. Networks of mainframes, minis, and personal computers are typical. The PCs are on a LAN that has a gateway to a mainframe or midrange network (Figure 1 3-3). The connection of PCs to networks of midrange computers and mainframes has resulted in the client-server architecture. A client on a personal computer connects to a PC, midrange computer, or mainframe that is the server. The server retrieves data and manipulates it in some way for the client. The client may also process the data further after moving it to his or her PC. A network may have more than one server. For example, our network has various servers for different departments, and some servers are dedicated to certain applications, such as running a mathematical problem-solving system. A user can connect to a
Federal Express is the leading express deliv ery company in the world. All its 2200 loca tions are connected through the company's Intranet. The company is phasing out main frame computers where possible and moving to a client-server architecture. The I ntranet provides information as well as many other services such as multimedia training. FedEx will install parts of its Intranet be hind customers' firewalls so that it and the
customer can be tightly integrated. This technology is tying FedEx more closely to its customers than even its Extranet can. The advantages for both parties are great; all u s e rs access i nformation u s i n g a Web browser; there is no need to change inter face programs with every new application. This suggests that companies in the future will be very tightly integrated through shared networks and shared applications programs.
335
336
PART THREE: I N FORMATION TECHNOLOGY
FIGURE 1 3·3 A mixed architecture.
number of different servers from his or her local PC. In a two-tier client-server system, the server performs most of the processing and contains the database while the user's PC runs an interface program and does some local processing. In a three-tier system, there is a server to perform most processing and a server to host the database. Vendors like Sun Microsystems adopted the client-server model as the basis for their entire product line. Sun encourages customers to purchase client workstations and a larger workstation to act as the server. The company runs all its factories and distribution systems on client-server systems using Unix, and uses a client-server system for all order entry and processing. To provide powerful client-server systems in an effort to capture market share from minis and mainframes, Sun has developed a large-scale server expandable to 20 processors, each with up to a terabyte (1012) of
CHAPTER 1 3: I N FORMATION TECHNOLOGY ARCHITECTURES
disk capacity and 5 Gbytes ( 109) of RAM. Sun claims that the server supports up to 1 000 users initially and up to 2000 in its largest configuration. IBM has advanced a vision of computing it calls "Network-centric." Its chair man feels that IBM's customers are working to become more efficient and competi tive, reducing cycle times and becoming more responsive to customers. All these efforts require collaboration with customers and suppliers, and they all depend on networking. IBM is positioning its computers as servers and/or clients on large net works and providing networking services that charge transactions fees. For exam ple, Walgreen's developed a system that lets doctors send prescriptions to pharma cies electronically over an IBM network, and the pharmacy pays a transaction fee to IBM for each prescription. IBM's strategy also led it to acquire Lotus in order to obtain Notes, a groupware product discussed in Chapter 2 1 . Other vendors promote what they call open systems-those that enable con nections of different sized computers from a variety of vendors. Sun argues that this kind of open system is more complex than its client-server architecture, which runs only on Suns, because one expects greater complexity when several different types of computers are connected on a network. Of course, many companies have large investments in a variety of midrange and mainframe computers; in the short run their only choice is to move toward an open architecture in which there are likely to be different kinds of clients and servers on a network. It is also clear that individual users have developed favorite types of computers. It is almost impossi ble to dictate to someone what his or her workstation has to be. Some users feel that a terminal is fine, and they do not need a lot of local pro cessing power. However, they would like to have friendly software that provides windows, something associated with the use of a PC or engineering workstation. Researchers at MIT developed a terminal with these capabilities called the X Win dows system. A number of vendors offer X Windows terminals and software so that a simple terminal can provide a graphical user interface. The vision for the future is client-server computing where the user works with a client workstation to access data from a variety of servers. The size of these servers and their location are of no interest to the user who is accessing the infor mation they provide. The Internet is an excellent example of this kind of architec ture. Your browser communicates with one or more servers; as you follow hypter text links from one server to another, you do not need to know the server's location. For a large corporation with distributed computers, this same model works well. If you add an Intranet and connect it to transactions processing servers in the firm, you may get to the point where the main program run on a client com puter is a network browser. Certainly there are a lot of choices in developing an architecture. Later in this chapter we try to provide some broad guidelines for matching a systems design to hardware and software architectures. What Is Infrastructure? IT infrastructure can be defined as the hardware, software, and networks that the firm maintains for common use. Some reserve the term for items that a single
337
338
PART THREE: INFORMATION TECH NOLOGY
business unit cannot justify on its own but that make sense for the corporation. For example, it is unlikely a small department would develop its own Intranet, but it would take advantage of a corporate Intranet to publish material that others in the company would like to share. I generally think of infrastructure as the stock of hardware, software, and networks that exist in an organization at a given point in time. This stock is what you have available when the opportunity for a new IT ini tiative arises. It is important to keep the infrastructure up-to-date so that you can take advantage of these opportunities. However, it can be very difficult to convince management to invest in infrastructure in order to take advantage of some future option that you cannot identify right now. The Advantages and Disadvantages of Standards There are two kinds of standards: agreed upon and de facto. We have seen the importance of international standards in our discussion of communications and networks. International standards make it possible to directly dial phones in differ ent countries. EDI standards have encouraged the exchange of data between com panies. Internet standards make possible the World Wide Web and let browser pro grams display content from millions of servers. Companies like to have their products become de facto standards in the indus try. In the early days, IBM mainframes and their operating systems were a stan dard. Major changes in architecture, along with the development of mini and per sonal computers, local area networks, and the Internet changed that standard. Vendors with computers running Unix want this operating system to become a standard on midrange computers and servers. Microsoft has followed a strategy of making its products the standard for personal computers: Windows 98 and Mi crosoft Office have become a de facto standard in organizations. Microsoft wants Internet Explorer to be the browser of choice, and sees Windows NT as the appro priate operating system for the server today, and the desktop in a few years. Oracle sees itself as the standard for client-server database management systems, and SAP believes it is the standard for enterprise applications. Such standards have both advantages and disadvantages for the customer. Stan dards encourage the sharing of information with minimal conversion from one ap plication to another. We have seen that standards also facilitate interoperability. De facto standards, particularly from a single vendor, give that vendor tremendous market power and may reduce innovation. The development of the Net PC is an effort to break the de facto Wintel (Windows on an Intel processor) personal com puter standard. While your organization will most often choose a standard, it is important to recognize both the advantages and disadvantages of this strategy. EXAMPLES OF DIFFERENT ARCHITECTURES Competitive Reservation Systems The maj or airlines have developed complex and sophisticated computerized reservation systems (CRSs) (see Figure 13-4). American Airlines developed its SABRE system first to keep track of reservations, as manual reservation systems
CHAPTER
FIGURE
13:
I N FPRMATION TECH NOLOGY ARCHITECTURES
1 3-4
Airline reservation system.
were predicted to break down in the early 1 960s with the expansion of jet travel. Other airlines followed American's lead and developed systems of their own in the 1 960s and 1 970s. These CRS applications feature very large mainframe computers. In the case of American, 1 7 large IBM mainframes (with multiple processors) are specially con nected in two groups, one for reservations and one for fare data. In each group, one machine is a backup that takes over if something goes wrong with one of the other computers. The SABRE database has contained in one month up to 45 mil lion fares and experiences millions of changes each month. The system creates 500,000 PNRs (passenger name records) daily. The complex has processed a peak of 5300 transactions per second and serves more than 360,000 devices in 74 coun tries on six continents. There are 30,000 travel agents, 400 airlines, 39,000 hotels,
339
340
PART THREE: I N FORMATION TECHNOLOGY
FROM SABRE'S WEB SITE The heart of our technological infrastructure is in Tulsa, Oklahoma, the home to our 1 20,000 square foot high-security data center. Housed in the data center are 17 mainframes with more than 1 5 .3 tera bytes of electronic storage, over 4,000 MIPS of processing power, 1 80 communications processors and numerous midrange, UNIX-based computers. This data center runs the SABRE Computer Reser vation System (CRS) in a mainframe operating en vironment, the ideal solution for the high-volume,
high-availability requirements of the distribution business. The networking capability of SABRE is also im pressive. We manage networks consisting of nearly 200,000 personal computers. In addition, we main tain over 45,370 telephone numbers and 10,200 voice mail boxes which handle more than 1 1 5 million calls annually. SABRE networking solutions include wire less technology as well as sophisticated voice and data telecommunications technology required to sup port a broad range of computing solutions, such as complex Internet sites.
and 50 rental car companies that use the system. The system processes an esti mated 45 percent of all domestic U.S. airline reservations. SABRE is certainly a high-volume fast-response mainframe application. In addition to reservations, CRS applications are expanded to include many other functions. The computers keep track of when flights depart and when they will arrive. (American Airlines jets send radio messages to the computer on take off to update flight monitors.) The CRS systems also help specialists load aircraft to keep them balanced. A CRS keeps track of special meal requirements and can connect with other systems to provide rental cars and hotel rooms. One of the major expansions of reservation systems occurred when American and United decided to place terminals connected to their systems in travel agents' offices. Their systems already showed the flights of competing airlines so reserva tion agents could answer customer questions. All that was needed was a way to make reservations on other carriers' flights. Now, the airline industry can be viewed as having a huge network of intercon nected computers. The reservation systems are operated by individual airlines, but they all send messages to each other. USAir allocates a certain number of seats on its flights to the SABRE system. When the flight is to be closed, USAir sends a message to SABRE to close that flight segment, and so on. Millions of messages flow among the computers each day. Travelocity: Interfacing a CRS to the Web SABRE responded to the opportunities offered by the Web with EaasySabre and Travelocity. The first is an American Airlines-oriented connection to SABRE, while Travelocity is a more "neutral" system that anyone with a browser can use to access schedules and fares as well as make reservations. Figure 1 3-5 is a simpli fied diagram of how Travelocity works.
CHAPTER 1 3: I N FORMATION TECHNOLOGY ARCHITECTURES
D Sometimes technology can let a company enter a new market by making a new service economical. The Internet and Web provide many opportun ities for providing service given the ease of developing a site and the availability of a worldwide network infrastruc ture. Korn/Ferry is one of the major execu tive recruiters in the U.S. Because of the ef fort i nvolved i n an executive searc h , Korn/Ferry specializes in searches for very senior rnanagers who command large corn pensation packages. (The recruiter's fee is usually a percentage of the executive's com pensation, which is paid by the company that requested the search.) This recruiter has established a new sub sidiary called Korn/Ferry: CareerLink which targets managers and professionals earning
$75,000 to $ 1 20,000 a year. The kind of search performed for a senior executive would be too expensive for the fees gener ated at this salary level. CareerLink relies on the I nternet to augment its usual search tac tics. Corporate clients have asked recruiters to serve this market. Korn/Ferry has estab lished an electronic database to match po tential applications with vacancies. It inter views and screens the best cand idates . Clients can download an interview videotape before deciding to meet a candidate. The addition of the interview and videotape is a value-added service compared to the many e lectronic j o b b a n ks on the I n ternet. Korn/Ferry thinks that CareerLink may turn out to generate more revenue than its tradi tional business.
The challenge is to provide a variety of services through a group of Web servers. The customer must be able to access all the information in the SABRE databases using a browser, even though these data are normally accessed through SABRE programs running on a PC or terminal. The system has been described as a "travel mall," more than just an airline reservations system. The system receives feeds from 5000 data sources. The site must provide electronic commerce capabilities so that a customer can purchase a ticket. The commerce and merchant servers shown in Fig ure 1 3-5 serve this purpose. Worldview is a partner in Travelocity that compiles, re formats, and sells data on travel to various companies in the travel industry. With so many connections and computers, performance becomes an issue. The system can provide 30-40 Web pages per second, and 4000-5000 database queries per second. There are some 300,000 Web pages available to the person browsing the site. Travelocity gets more than 30 million "hits" a month and makes money through transactions charges for reservations made using the system. Transactions volume has been growing at a rate of 20 percent a month, making it necessary to add capacity on a regular basis. Travelocity is an excellent example of adding a Web capability to an existing large complex application, in this case a computer ized reservations system. Many organizations have created Web connections to ex isting applications to extend access to crucial data and provide new services to customers.
34 1
342
PART THREE: I N FORMATION TECHNOLOGY
FIGURE 1 3·5
The structure of Travelocity. Travelocity interfaces the Web to mainframe systems.
A Broker Workstation Stockbrokers assist their clients with investments. The broker is both a consultant and a salesperson, and is compensated based on the amount of trading he or she does for customers. The broker needs a great deal of data about the stock market, the securities and other instruments the public can buy, and the client. For many years, brokers have had stock quotation terminals on their desks so that they can get the latest price of a security. Many brokers added their own PCs to keep track of customer portfolios, write letters to customers, and do other information pro cessing tasks. Several major brokerage firms and independent companies are developing bro ker workstation systems. One of the largest U.S. brokerage firms installed 1 7,000 personal computers running broker workstation software for its stockbrokers. The objective is to replace all terminals with a single PC-based workstation for each
CHAPTER 1 3 : I N FORMATION TECHNOLOGY ARCHITECTURES
FIGURE
1 3-6
Broker workstation system.
broker. The schematic of one independent's system is shown in Figure 1 3-6. This firm operates a ticker plant in New York that accepts data feeds from the stock ex changes and companies that sell financial data. The ticker plant relays the data to a satellite, which then broadcasts the data throughout the United States. A customer (generally a brokerage firm office) needs a satellite dish on the roof to pick up the broadcast signal. Within the local office, there are at least two servers and a local area network. One server maintains. historical data, which can be accessed by the broker from the workstation. Another server handles communi cations and accepts the incoming data stream from the satellite. Because many brokerage firms have their own corporate mainframe systems that maintain customer data, it is possible for the broker to open a window on the work station and make that window emulate a standard IBM terminal to communicate with the corporate mainframe. The broker workstation provides a number of fea tures controlled by the Pc. It provides multiple windows that execute individual
343
344
PART THREE: INFORMATION TECHNOLOGY
applications. The broker can set up monitors to follow a single stock or groups of stocks; for example, it can set alerts to go off if the stock of XYZ Company hits a certain price. A number of applications packages are also available on the system, including electronic mail, word processing, and presentation graphics. Chevron Canada Client-Server Model Chevron Canada used a client-server model to redesign a sales-monitoring applica tion (Sinha, 1 992). This application connects Chevron's Canadian distributors to the Vancouver corporate headquarters and replaced a 20-year-old batch processing, mainframe system. This system is used for order entry, tax, inventory control, and management reporting. Over the years, it has added on-line transactions processing capabilities and limited decision-support functions. As shown in Figure 1 3-7, the client-server design features a wide area network connected to local area networks. There are multiple servers along with a connection to a mainframe in San Fran cisco. Eventually the system will handle about 1 65 ,000 transactions per month from over 35 remote sites; some 65 local clients will also make requests. When completed, each client will be connected to a local server containing data relevant to that client. There will be some 300 relational tables distributed over multiple servers and replicated on a central server in a 3-Gbyte database. Comparing the Applications The broker workstation application features a much different architecture from the CRS example. The brokers do either limited or no updating of the database. The data are updated centrally at the ticker plant and copies are kept on each LAN. There is some two-way satellite transmission for broker queries of the database, but higher-volume transactions with the broker's own, in-house mainframe com puter take place over terrestrial lines. Users share the price data through the LAN, and the personal computer gives them extensive discretion on what they do. One broker may be analyzing a cus tomer portfolio while another provides a customer with a stock quotation. At the same time, a broker's assistant may be using the system to send out a mailing to all customers interested in a particular stock. In the Chevron case, the application is similar to the CRS in that both systems process a large number of transactions, but the airline CRS is centralized and Chevron has chosen a client-server architecture. Of course, the Chevron system processes far fewer transactions than an airline CRS, and that is the reason it can adopt an architecture dependent on a number of small computers. It is significant that LANs and client-server systems have developed sufficient power to be used in transactions processing applications at all. With extremely high volumes of trans actions updating, you still need a mainframe or large midrange computer. Travelocity offers a completely different architecture; it is a Web application built on top of an existing mainframe application. This approach to reaching customers and suppliers is very common; much of the data of interest to these users are on transac tions processing mainframes. The Federal Express package tracking capability on its Web site also lets a customer with a browser access data on a mainframe system.
CHAPTER 1 3: I N FORMATION TECHNOLOGY ARCHITECTURES
FIGURE 1 3-7
Client-server with WANs and LANs.
345
346
PART THREE: I N FORMATION TECHNOLOGY
The president of Sabre Technologies stated that there is simply no other oper ating system that can handle 5000+ transactions per second at 99.95 percent up time than the mainframe airline control program. Travelocity operates a large mainframe system for Web access. However, in general, client-server architecture is today steadily eroding the dominance of mainframes and mid-sized computers in on-line transactions processing applications. In the case of an airline CRS, the need for mainframes is clear. In other applications, the designer will have a choice. Today cost/performance advantage lies with client-server architectures for many applications. MATCHING DESIGN TO AN ARCHITECTURE When the Architecture Is a Given In many situations, an application will have to run on an existing architecture be cause that is what the organization is willing or able to provide. In this case, the guidelines below can be used, but they must be modified to fit organizational con straints. Sometimes, however, the architecture can be modified to provide the ap pearance of a new system. It is very expensive to redesign large transactions pro cessing systems, and some firms have been updating the design of these systems by hiding the old system behind a new PC interface. One option is to maintain the mainframe system solely to process transactions and build a database. The firm adds separate servers to process queries and provide decision-support software to client computers.
CHAPTER 13: INFORMATION TECHNOLOGY ARCHITECTURES
Suggested Guidelines In this section we suggest some guidelines for considering the interaction between hardware and software architecture and systems design. The type of architecture will influence design. As systems designers, we have radically different choices depending on whether we plan to implement on a LAN or a mainframe with ter minals. Some basic guidelines are as follows:
1. Start sizing an architecture at the smallest and least expensive option. Can a suggested application be completed on a PC with packages? If there are multi ple users accessing a central database, the answer is probably no. The same is true if there are too many simultaneous users. A PC will probably run Win dows 98 or Windows NT and will make use of a popular "suite" of office ap plications that include a spreadsheet, word processor, presentation graphics program, and database management system. 2. If a stand-alone PC is not adequate, can a system be developed using a LAN? The LAN accommodates multiple users who can share data files. The same software as discussed above is appropriate, but the server will probably run Windows NT. At some point, there may be too many users for the LAN, or more likely there will be too high a volume of activity for the servers. It is also possible that the system must handle a large volume of transactions, in which case the LAN is not currently the best alternative. 3. A client-server architecture featuring workstations or midrange computers as the server is a cost-effective alternative for many applications as long as the system can handle the processing load. The server here may run NT or Unix, while the clients run Windows 98. User applications may be developed using the PC database management package or a midrange DBMS like Oracle or Sybase. 4. Midrange computers have the capacity to handle a large number of transac tions and large databases, and can control large communications networks . You may program these systems in the language of a DBMS or in a language like C++. 5. Mainframes can handle large volumes of transactions and huge databases. They, too, excel at controlling large communications networks. If the main frame application exists already, then you will probably have little choice in the programming language and operating system. However, if the application is new, and you are using a new, large computer, you may be able to use Unix as the operating system and C or a 4GL as an applications development language. 6. If users need local processing power and discretionary use of computers, a mixed network including mainframes and PCs is the likely choice. This con figuration is also popular when the organization has a large number of legacy computers and applications; networking them provides users with the features they need and widespread data access. 7. Organizations today need to have connections to the Internet; they will also obtain many benefits from an Intranet and possibly an Extranet as well.
347
348
PART THREE: I N FORMATION TECHNOLOGY
Levi Strauss has developed a fast-response system for mass customization . The com pany can sew a pair of woman's jeans to fit the size of the customer. The process begins when a clerk measures a customer for jeans in one of the company's Original Levi 's stores. The clerk inputs the data into an ex pert system, which sends it to a Notes server at Custom Clothing headquarters in Newton, MA. Notes sends the data to a fabric-cutting machine at a Levi's plant in Crystal City, TN. Factory workers tag the special order with a
bar code and send the cut garment out for laundering. It then returns to the factory for stitching. The bar codes match the finished pair of jeans with the customer file. The com pany sends the finished jeans to the original store or to the customer's home. Some experts in manufacturing suggest that mass customization or "agile manufac turing" will be the next major trend in indus try. It allows companies to focus on cus tomer service and quality, selling something beyond the basic product to the customer.
Dealing with the Problem of Data
A fundamental aspect of design is where to keep data and where to update it. In the airline CRS, all data are maintained centrally because of the need for instanta neous information and the frequency of update. In the broker workstation system, the users do virtually no updating of the data distributed from the ticker plant. Be cause fast response is important for brokers, it is a good design decision to dupli cate the data locally. The price server in each office has identical information that it accepts from the satellite dish on the roof. In other systems the trade-offs will differ. The designer has to balance response time, updating frequency, the need for up-to-date information, and the cost of du plicate storage. If there are to be copies of the data, we must also be concerned with the integrity of all copies. Does each copy have to be updated whenever the master record changes? In the broker workstation, a constant stream of data up dates the local file server. In other applications, it may be adequate to refresh local databases less frequently. CONTEMPORARY TRENDS IN ARCHITECTURE The discussion in this chapter suggests that the role of the mainframe is chang ing. Mainframes have been making a small comeback and are likely to be around for a long time. What is happening to mainframes, or large computers, to rekindle their sales? Mainframes are declining in cost, an estimated 50 to 75 per cent during the 1 990s, because they can take advantage of some of the same technology as PCs. Mainframes are undergoing dramatic changes in their archi tecture as they become more modular or come to feature totally parallel opera tions. Vendors are producing smaller, more powerful, and more affordable main frames . They are switching from older, more expensively fabricated circuits to
CHAPTER 1 3: I N FORMATION TECHNOLOGY ARCHITECTURES
Jirka Rysavy bought an 1 1 -employee money losing local office supply store in 1 987 for $1 00 and the assumption of $1 5,000 in over due accounts. The store had $300,000 a year in sales. Eight years later, the store was a multinational corporation with $1 billion a year in sales. Integral to the success of Cor porate Express is the high level of customer service, which is evident in its Web-based or dering system. A customer logs onto the Corporate Ex press Extranet using her name and a pass word. The system, called E-Way, checks records associated with the name to identify where to deliver the order and to note any custom information such as spending limits, approval routings, etc. Each department shares a corporate number so that the com pany as a whole gets the best corporate dis-
count possible. The customer can use a pre defined template for standard orders or can enter individual items directly. The system features a catalog search option with pic tures of the products a company has autho rized for purchase. The customer also is able to check off specific reporting and ledger codes on the order for internal purposes. The customer can s e n d a copy to h e r m a n a g e r f o r approva l , t h o u g h the system itself h a s built-in spending levels for individuals and departments. Corporate Express's Web ordering sys tem, E-Way, provides a high level of cus tomer service and routes information within client companies. It is a good example of taking advantage of the infrastructure pro vided by the Internet and World Wide Web.
CMOS (complimentary metal oxide semiconductors), a less expensive technol ogy. This technology lets the manufacturer put more logic on fewer chips and circuit boards. IBM is also selling a line of mainframes that feature parallel ar chitectures using RISC-based technology. A basic requirement of any new design is that the mainframe remain compati ble with existing software and meet the timing requirements of on-line systems. Within these requirements, designers are free to try novel approaches to the hard ware in an effort to improve the cost/performance characteristic of mainframes. The role of the mainframe is evolving. Instead of performing all calculations, the mainframe will become an extremely powerful server on networks. It will handle multi-billion-byte databases, providing data to clients on the network. The clients will do much of the processing of these data before returning them to the mainframe server to update the database. Trends are clearly toward client server architectures, and a variety of computers will take on the roles of client or server. However, as this and the previous chapter have stressed, the future of technol ogy is in the network, both inside the organization and externally through private nets and the Internet. The architecture here is pure client-server. The power of technology comes from the combination of computational capabilities, huge searchable databases, and communications. These technologies have truly changed the world !
349
350
PART THREE: INFORMATION TECHNOLOGY
CHAPTER SUMMARY
1. The designer used to be able to remain independent of the hardware and software architecture until fairly late in the design process . Now, architec ture interacts with the design because it is central to decisions about the user interface, the volume of processing, and the design of the database. 2. Architecture is the place where all of IT comes together: computers, data bases, communications, and networks. 3. Architecture is also concerned with the location of processing and the pattern of computer users' access. 4. Architecture is closely related to infrastructure, the stock of technology avail able in the firm. Investments in infrastructure provide you with the technology to take advantage of new opportunities to innovate with IT. 5. Mainframe vendors are working to improve cost/performance characteris tics of their products compared with smaller computers. An increase in sales for new mainframes suggests they are succeeding. Firms use mainframes for high-volume processing tasks and to continue executing critical legacy systems. 6. Midrange computers may be used for on-line transactions processing and as servers in networks. 7. The PC is the workstation of choice for the average user. S. The most popular architecture today is client-server, where client PCs connect to servers that may be other PCs, midrange computers, or large computers. All these computers form a network linked to the Internet. The firm is also likely to make use of Intranets and Extranets to make information available inter nally and to external business partners. 9. It is difficult to develop guidelines for choosing an architecture. In general you will want to develop an architecture that costs the least while providing the processing power you need. 10. Frequently you will confront an existing architecture because the firm has been using technology for a number of years. You will only be able to make small changes to this architecture because of the applications that currently run on it. 11. While you want a low-cost architecture, remember that transforming the or ganization requires an adequate technological infrastructure. Otherwise you will not be ready to take advantage of opportunities that arise to innovate with technology. IMPLICATIONS FOR MANAGEMENT An IT architecture is complex for all but the smallest organizations. The good news is that you will probably not have to decide on one alone. Developing an IT architecture involves both managers and IT professionals. As a manager, you want to see if there is a coherent plan for an architecture and if decisions about the ac quisition of new hardware, software, and communications devices are consistent
CHAPTER 1 3: INFORMATION TECHNOLOGY ARCHITECTURES
with that plan. A second managerial responsibility is to be sure the firm has an IT infrastructure that allows the firm to take advantage of technology when new op portunities arise. KEY WORDS Broker workstation Client -server architecture Computerized reservations system (CRS) Local area network (LAN) Mainframe Midrange computer Minicomputer On-line transactions processing (OLTP) Open system Server Standards RECOMMENDED READING Copeland, D.; and J. McKenney. "Airline Reservation Systems: Lessons from History," MIS Quarterly. 12, no. 3 (September 1988), pp. 353-370. (An excellent history of the development of CRS applications by the airlines.) Sinha, A. "Client-Server Computing," Communications o/ the ACM. 35, no. 7 (July 1992), pp. 77-98. (A comprehensive discussion of the technology of client-server computing.) Weill, P.; and M. Broadbent. Leveraging the New Infrastructure. Boston: Harvard Uni versity Press, 1 998. (A book presenting the results of a study of infrastructure in over 1 00 firms.)
DISCUSSION QUESTIONS 1 . What is hardware architecture? 2. What is software architecture? 3. Why could design be independent of the type of architecture in the 1960s? 4. What kind of applications are best suited to a mainframe? Do you expect to see many
new mainframe applications being developed? 5. What types of systems are probably best designed for a midrange computer? 6. Why are users so enthusiastic about PCs? 7. What led to the need for PC-to-mainframe links? 8. What is the purpose of a LAN? 9. What does a file server do in a LAN? 10. What are the advantages of mixed architectures? 11. Why might you want to centralize a database and keep onl)' one copy of it? 12. In what situations might it make sense to have more than one copy of a database? 13. Are there applications where it does not matter if multiple databases are simultaneously
updated?
35 1
352
PART THREE: I N FORMATION TECHNOLOGY
14. What problems can exist if data are not updated on identical databases? 15. Why does the broker workstation system store a copy of the data from the
ticker plant in the local office? 16. Why would it be difficult to redesign a CRS to run on another type of architecture? 17. What is the motivation behind client-server architectures ? 18. D o you think that mainframes will gradually disappear? 19. Where might client-server systems not be applicable? 20. Why might a firm want to connect networks at different locations? 21. How is the Internet a model architecture?
CHAPTER 1 3 PROJECT
Simon Marsha l l Associates In Chapter 9 Simon Marshall asked for your help in thinking about new operating systems. One consultant recommended to Mary that the company stay with Win dows 98 and that it look at two types of local area networks: a network with a server or a peer-to-peer network. In order to run the groupware that interests John, the consultant said they could use Lotus Notes on the network with a server or buy a peer-to-peer network. What are the pros and cons of each approach? Which do you recommend for Simon Marshall?
CHAPTER 1 4
Outline
The Industry To Buy or Not: Major Applications
The Decision Context Processing The Services Industry What Sources Should Be Selected?
Hardware Software The Pros and Cons of Outsourcing
Strategies for Acquiring Equipment and Services Evaluating Performance Acquiring Computers Dealing with Obsolescence Dedicated Applications Packages Establishing Criteria Making a Final Decision Enterprise Software Packages Packages for PCs
An Example
353
354
PART THREE: I N FORMATION TECHNOLOGY
Focus on Change Dramatic applications that change the organization are likely to require the acquisi tion of new hardware and software. A manager must be prepared to make what are sometimes risky acquisitions to fashion systems that have a significant impact on the firm. There has been some movement toward outsourcing and toward strategic alliances to reduce the time required to develop significant applications. Buying in stead of making is one strategy to bring about change more quickly in the firm. •
Managers are frequently involved in the evaluation of hardware and software. In fact, too often users try to make these decisions alone. The purchase decision is one that usually warrants advice from systems professionals. This chapter explores the problem of selecting hardware and software and suggests procedures for their acquisition. After a brief survey of the industry, we discuss how a firm might acquire a major application for a significant system, one that involves a number of individu als in the organization. Then we discuss some of the problems of choosing pack ages for individual workstations as well as the acquisition of enterprise software. We close the chapter with an example of poor decision making on the acquisition of a network and discuss the consequences. THE INDUSTRY The computer industry today consists of firms that sell hardware, software, and services. •
•
•
Hardware firms range from the giant IBM to small companies making their own brands of personal computers from components purchased around the world. IBM, Fujitsu, Amdahl, and Unisys manufacture large computers as well as smaller machines. DEC, Hewlett Packard, Sun, and others manufacture and sell midrange computers, while a large number · of companies like Compaq, IBM, Dell, Gateway, and similar firms sell personal computers. You can buy software from a large number of companies as well. Manufacturers of large computers often sell proprietary software for them, especially operating systems. (Remember our discussion of IBM and its MVS mainframe operating system.) Companies like Computer Associates sell a great deal of software for large-scale computers. Microsoft sells a wide variety of software for personal computers and servers as do many smaller companies. There are hundreds of small software companies that sell special purpose software, for example, a pro gram for shipboard navigation using a notebook computer. The rapid proliferation of technology created a large service industry to help companies integrate technology with their strategy and operations. IBM has a consulting subsidiary that competes with Electronic Data Systems (EDS) and Andersen ConSUlting, a firm with over 59,000 employees in 46 countries work ing to implement IT solutions for customers. Service companies will develop a single technology application or contract to take over the operations of your en tire IT effort, a process called outsourcing.
CHAPTER 1 4: SYSTEM ALTERNATIVES AND ACQUISITION
TO BUY OR NOT: MAJOR APPLICATIONS The Decision Context The first acquisition situation we shall discuss involves a multiuser application such as an order-entry system for the firm, or a production control system. (The design of this type of system is the topic of the following section.) A user makes a request for an information system. Assume a systems analyst responds with a pre liminary survey, which is positive. Should one stop at this point and look for a package? Some in the field, particularly package vendors, would say yes, further analysis is a waste oftime. There are, however, several compelling reasons for further work before examin ing packages. First, undertake a preliminary analysis of the present system and create a high-level logical design. This design includes output requirements, data base design, and input needed. You should have a good idea of the functions of the system and some of the features it must have in order for users to work with it. This preliminary set of specifications acts as a benchmark for evaluating various options. Now the design team has a plan, a benchmark specification against which to judge various offerings from different vendors. It is far too easy to be swayed by a convincing sales presentation. With a benchmark, the design team determines ex actly what is present and what is omitted from various available systems. Different packages can be arrayed against a custom system to estimate the extent to which each alternative meets users' needs and expectations. Figure 14- 1 shows how we might proceed. First, identify the problem and pre pare a preliminary design document for a new system. Note that at this point one is not concerned with the acquisition of hardware. Although it is premature to think about acquiring computer hardware, it is important to determine roughly what scale of hardware is necessary for a planned system. Is the system capable of running on personal computers? On a network of pes? Will it require a midrange or larger computer? These questions can be answered by estimating the size of the system: How many transactions have to be processed? What is the size of the data base? What is the volume of file activity? What is the peak volume versus the av erage? The answers to these questions will help narrow down the hardware alter natives and in tum allow one to think more about the kind of package, since packages are written for certain sizes of operations. Given a rough design and a feeling for the overall size of a system, alternatives such as those shown in Figure 1 4- 1 can be explored. Alternatives are listed below: •
•
A custom system programmed to do exactly what is requested in the specifica tions. Of course, the specifications must be developed in greater detail for pro gramming, but this is the traditional way of developing a system. A database management system like Oracle or Sybase. This package and the associated software for querying and possibly generating the actual applica tion can speed development while providing many of the features of a custom system.
355
FIGURE
1 4·1
Selection alternatives.
356
CHAPTER 1 4: SYSTEM ALTERNATIVES AND ACQUISITION
There are a tremendous number of options for data input; scanning has become ex tremely popular because you do not have to key in data. The scanner improves accuracy and reduces data entry time. M cKesson Corporation has f o u n d a wearable computer i ncorporating a laser scanning device; the input part of the pack age fits on the wearer's hand, wrist, and forearm; it is connected to a waist-worn portable computer that uses radio frequency links to download inventory data to a PC from any location in the warehouse. Ware house workers use the computer to track pharmaceuticals and other goods when they are received and shipped. The worker can actually scan bar codes from 1 0 to 1 5 feet. I n one McKesson ware-
•
•
house productivity has increased 1 0 percent and the number of incorrect orders filled has been cut by 72 percent. Of course, there is one key to the success of this system: The products coming into the warehouse have to be bar-coded by their manufacturers. In general a wearable computer consists of a small motherboard (board containing CPU and memory chips), possibly no larger than a credit card, and a lightweight "heads up" display built into an eyeglass. The user straps the computer to his or her belt and uses speech input to control the machine. We expect that in the next few years this kind of mobile technology will appear in a number of applications from automobile re pair to stock brokers, real estate agents, and fire and police services.
A dedicated package-software written by an external vendor particularly for the application under consideration. SAP is one of the most popular "enterprise" applications; it covers many of the functions performed by the typical firm. Ora cle also offers applications software built around its database software. Locate an outside contractor or outsourcer to undertake all or part of the devel opment process. A variety of software consultants provide services in all phases of the life cycle. For example, you might hire a firm to design the system, and/or hire programmers and staff from an external firm to carry out all the steps fol lowing detailed design.
If you select the package alternative, several computer trade journals publish annual surveys of packages. There are also proprietary services that purport to list all major software packages. If the organization already has a computer, contact the vendor representatives to determine if they are aware of any packages for their computers. Another good source of information is industry trade journals, for ex ample, banking journals for finding bank applications . A search of the World Wide Web is also a good way to start looking. Processing In many instances, the decisions made in the top half of Figure 14-1 determine the hardware that must be used for processing. For example, if you choose a package that runs only on an IBM computer, you will have to find IBM-compatible equip ment for processing.
357
358
PART THREE: INFORMATION TECHNOLOGY
If you are not constrained by the first decisions made in developing a system, what are some of the processing alternatives? First, an outsourcer can be used; these organizations provide all types of processing. The services themselves may offer special packages or may have data available that contribute to solving the problem. Many banks, for example, outsource the processing of their credit card transactions. For internal proces sing, the options depend on the architecture the firm adopted, as discussed in the last chapter. The firm may already have a mainframe, midrange computer, or client-server network that new systems are expected to uti lize. Processing requirements may determine which alternative is recommended for the design of a system, for example, database size or transactions volume. It may be possible to quickly create an application that runs on the firm's Intranet or an Extranet. After exploring the options, you must compare the various possibilities. Each alternative should be examined on a number of criteria; then a decision can be made on the best way to proceed, considering both software and hardware. THE SERVICES INDUSTRY We have stressed that custom development is no longer the automatic choice while planning a new application. There are a number of ways to obtain technology sup port in both the development and operation of computing applications. In this sec tion we discuss some of these possibilities.
1. Computing power. Service organizations have offered computing time and power for a number of years. While some organizations need extra computing power, the steady decrease in already low hardware costs suggests that the mar ket for raw computing power in general will disappear. Service organizations al ready offer a number of custom programs and proprietary databases so that the customer can obtain a service that is not available in-house. A number of service firms provide value-added networks. A good example of an external service is General Electric Information Services Co. This company offers conversion soft ware, network services, and EDI mailboxes to firms that want to conduct busi ness using EDI without acquiring and setting up their own EDI capability. Today companies like IBM offer Web services that run on server "farms," large data centers containing hundreds or even thousands of Web servers. 2. Proprietary applications. Software vendors, service firms (as discussed above), computer vendors, and others offer applications dedicated to business functions such as accounts-receivable processing. Many of these systems have been through several major revisions based on feedback from users. The dis cussion of packages in Chapter 1 8 points out some crucial considerations in evaluating this type of software. What is the quality of the package? How well does it suit the organization's needs? How willing are the users to change pro cedures given the cost of modifications?
CHAPTER 1 4 : SYSTEM ALTERNATIVES AND ACQUISITION
3. Proprietary databases. There is a large body of data that can be used for mak ing various analyses and decisions. By making the data machine readable and easily available, vendors of information create new businesses. One can pur chase information on the expected trends in the economy, various statistics about companies and stock prices, and the texts of legal cases, to name a few. These services can be used as an adjunct to an application or may furnish some of the needed input directly. 4. Communications. A number of vendors offer communications services and equipment as discussed in Chapter 12. Some of these vendors act as common carriers and provide communications networks. Others offer services such as electronic mail or computer bulletin boards in which individuals communicate about a given topic by sending messages to each other's electronic mailboxes in a computer file. 5. Consultants. Software consultants or vendors provide programming and sys tems design services for custom systems, and some offer special packages as well. The software vendor may contract to manage an entire systems develop ment effort or may furnish programmers to perform work assigned by the client. The staff of the consulting firm writes and tests programs. Closely related is the systems integrator, an organization that pulls together varied hardware and software components to make a system. Because many or ganizations feature mixed systems with components from different vendors, inte grators can be very helpful. Consider a firm that wants to develop a system to send data from a central mainframe to dispersed local area networks around the coun try. Such a system involves the mainframe and its software, some type of wide area communications network, the local computers, a LAN, and local computer software. A systems integrator would design the architecture of the system, help select the equipment, design and/or purchase software, and get the entire system up and running. Electronic Data Systems (EDS), Andersen Consulting, and IBM's ISSC are three of the largest and most successful systems integrators. WHAT SOURCES SHOULD BE SELECTED? What are the advantages and disadvantages of different sources for hardware and software? For discussion purposes, we can look at the two extremes in which all activities are undertaken either internally or externally through an outside organi zation (see Table 14- 1) . Hardware With an internal IS department, an organization must cope with the problem of managing the computer; thus overhead is introduced into the organization. For this price, management gains control over its own computer and communica tions operations. Data remain exclusively within organizational confines and are accessible only to employees. You establish processing priorities, and no other
359
360
PART THREE: INFORMATION TECHNOLOGY
TABLE 1 4- 1
COMPARISON OF INTERNAL VERSUS EXTERNAL SERVICES
Insourced
Outsourced Hardware
Management
Must manage information services department
Contractual arrangement; no line management responsible except for data preparation
Control
Control potential is high
Only through contract, influence, withholding payment
Security
Under own responsibility; data remain at internal location
Data in hands of external organization; other customers a threat
Priorities
Assigned by own employees
Determined by external management
Resources
Must accommodate peak loads; high fixed cost
Variable cost, pay only for what is used (beyond possible minimum charge); may have contractual fixed charge
Capacity
Limited to what is needed
Frequently more powerful equipment than could be justified by clients
Backup
Limited by internal resources
Usually available because of higher capacity Software
Management
Must manage program development
Contractual arrangements, specifications on cost, time, performance
Staff
May have to hire experts
Expect vendors to have expertise
Implementation
Probably easier in terms of users' reaction to internal staff
May be more difficult for "outsiders"
organization can preempt time from an organization with its own system. Man agement must provide sufficient resources to accommodate peak loads so there can be high fixed costs for computer equipment that may not be fully utilized under this alternative. B ackup may be limited by the resources that management is able to provide. Organizations choosing to rely on external services have a contractual agree ment with the outsourcing firm. These companies have found that running a com puter operation is best left to a firm that specializes in this activity. There are few management supervisory responsibilities because these tasks are delegated to an outside company. Control may be less than under the internal alternative because litigation over contracts is costly and time-consuming. Instead, the customer seeks to influence the outsourcer. Many firms worry about having sensitive data in the hands of another organization, particularly when other companies have access to
CHAPTER 1 4: SYSTEM ALTERNATIVES AND ACQUISITION
the same computer resources. The priority for applications is also in the hands of the organization providing services. Management influences, but does not control, processing priorities. With an outside organization, the customer incurs a variable cost and pays only for the resources consumed. Frequently, the client has access to more powerful equipment than would be installed internally since it is shared among a number of users. Software With internal software development, we must manage the development process. Internal program development often results in duplication. There may be a ten dency to start from the beginning with each new system. Because IS staffers can be wary of applications not generated in-house, sometimes they do not ade quately investigate package alternatives . Implementation problems, however, should be minimized because internal employees deal directly with the users in the firm. External software services are handled on a contractual basis, but the cus tomer may still need some individual who is familiar with information technol ogy to work with the contractor and monitor progress. For the most part, how ever, clients will rely on the vendor's expertise. Implementation can be difficult for "outsiders," although the client may be able to take advantage of an existing package or set of routines whose cost has been amortized over a large group of users.
361
362
PART THREE: I N FORMATION TECHNOLOGY
Doug Waikem is a car dealer in Massillon, OH. I n three years, hundreds of customers have d riven h o u rs from as far away as P e n n sylvania to b u y cars and trucks. Waikem offers cars for less on the I nternet than he does in his showroom because he pays far less for advertising and commis sions. This year, 1 0 percent of his total sales, or 400 vehicles, will be sold on the In ternet. Waikem is a member of Auto-by-Tel, which charges him $21 60 a month for refer rals. This company processes some 80,000 purchase orders a month for its dealers and has served one million customers since it began business in 1 995. The Auto-by-Tel fee amounts to $63 per car, which compares to $300 a car in advertising for vehicles sold from the showroom. Two employees (on salary rather than commission) operate the I nternet service.
Edmunds, another buying service, re ceives 50,000 hits a day on its I nternet site. Chrysler Corpo ration has predicted that 25 percent of customers will buy a car on the I nternet. Its own studies show that 70 percent of new car buyers have computer access and 45 percent say they will use the I nternet next time they buy a car. Customers using the Internet have access to tremen dous amounts of data about cars that inter est them . Many manufacturers have sites that contain pictures, colors, and specifica tions for their models. Edmunds offers test d rive results and reviews, as does M i crosoft's Carpoi n t (carpo i n t . m s n . c o m ) . These services provide manufacturer sug gested prices and estimates of the dealer in voice costs. On the West Coast GM offers an on-line service that lets customers search dealer inventories and get the best price.
THE PROS AND CONS OF OUTSOURCING One recent trend is outsourcing. This involves turning over some or all of your or ganization's IT effort to an outside firm specializing in operating, developing, and managing various aspects of information technology. Some articles make it sound as if outsourcing is a relatively new invention. In reality it represents more of a name change than a new kind of service. In the 1 960s EDS began to offer what it called "facilities management" services. Today EDS, Computer Sciences Corporation, a subsidiary of IBM called Inte grated Systems Solutions, and other firms provide outsourcing services. These firms negotiate a contract with a company that wishes to tum all or part of its tech nology function over to the outsourcer. What kind of services might you want to outsource? Obviously, the outsourcing consultant would be delighted to assume all of your IT activities. This firm would operate your existing applications, possibly on the outsourcer's computers or on your existing computers. The consultant would also gladly assume responsibility for running your communications network and for developing new applications. Some clients have chosen to retain part of their IT functions and to partially outsource some activities. For example, a large brokerage firm outsourced part of its network management, keeping control of the part it felt was strategic. A major
CHAPTER 1 4: SYSTEM ALTERNATIVES AND ACQUISITION
advertising agency outsourced its transactions processing and accounting applica tions while continuing to develop and manage systems designed to help the cre ative part of its business. Xerox outsourced its legacy systems (older IBM transac tions processing systems) to EDS so that it could concentrate on developing a new client-server architecture in house. Outsourcing is controversial: Some managers argue that it makes sense to let a firm that specializes in technology take over and act as an independent contractor. Why should we try to manage something that is not our specialty? On the other hand, others are not comfortable turning over to an external organization technol ogy that may be crucial to corporate strategy. We discuss outsourcing further in Chapter 24. Strategies 1for Acquiring Equipment and Services No matter which alternative is selected, the customer has to acquire computer equipment and/or services. What is the best way to approach this problem? There are several considerations a potential customer should have in mind. First, check the vendor's financial condition. A number of small companies in the computer in dustry have gone bankrupt. Even major firms have sold or discontinued their com puter manufacturing activities. How likely is a vendor to be around in the future to service the product and improve it? An extremely important research activity for a customer is to contact present users of a product to determine their level of satisfaction. How well does the prod uct or service meet the vendor's claims? What problems did users have? What kind of consulting assistance did the buyer need in implementing the software? If possible, visit users without a vendor representative to ask these questions. If it is
363
364
PART THREE: INFORMATION TECHNOLOGY
not possible to see a product demonstrated, do not buy it. Too often, announced products are delivered years late; insist on a demonstration, and attempt to evalu ate the performance of the product. Evaluating Performance A major activity in acquiring new equipment and software is an evaluation of the performance of the product. We also use evaluation techniques with an existing system to improve its performance through the acquisition of additional equip ment. Performance is generally defined as the response time of a system or the volume of input it can process in a given period of time. A cruise line presents an interesting example of how performance can be im portant in the selection of a computer system. The shipping line was investigating a software package for making cruise reservations. On the surface this reservations application sounds like any other, but there are a number of important differences. One is that passengers usually want to book a particular cabin or class of cabins when making a reservation. There can also be different itineraries for the passen gers in the same cabin. Thus, a package must be specifically designed for cruising. The cruise line in this example found such a package, but was concerned about whether it could handle the volume of processing for its ships. Fortunately, the pack age was in use at another, noncompeting cruise line roughly comparable in size. The computer vendor offered a performance evaluation tool, which monitored data from the actual execution of a job and used these data to develop the parame ters of a queuing model of the systems ' performance. The user of the model could ask what-if questions to determine the impact of changing the hardware on system response time. For example, one could estimate the impact of moving to a differ ent CPU, adding memory, and adding disk capacity. The cruise line obtained monitored data from the firm already using the pack age and used the vendor's model to analyze the data. The model indicated that per formance should be adequate for the cruise line and was helpful in recommending the computer configuration to acquire. In this instance, a combination of evalua tion techniques was important in the decision to acquire a new software and hard ware package. Acquiring Computers When you are acquiring a computer that will be dedicated to a single software ap plication, the decision is usually fairly easy once you choose the package because ( 1 ) there are usually relatively few computers for which the package is written and (2) the vendor has experience in knowing what kind of computer should be used given the firm's processing demands. The large number of computers available present a bewildering array of possi bilities. The organization is probably well advised to develop a standard (say, to support two or three specific types of personal computers) and to avoid acquiring others because the IS staff can develop expertise to support only so many. The organization may also be buying a network, following the client-server model example presented in the previous chapter. (See especially Figure 1 3-7,
CHAPTER 1 4: SYSTEM ALTERNATIVES AND ACQUISITION
We have used American Airlines and the SABRE systems as an example in a number of places in the text. Sabre Decision Tech nologies is a subsidiary of the airline that op erates the reservations system and provides a variety of consulting services to different companies. One of its clients is the French national railroad, SNCF. As European markets have become less regulated, the French railroads face compe tition. E u ropean rail roads provide much more extensive (and better) transportation than passenger rail in the U.S. First, Euro pean cities are closer together than cities in the U . S . , so a rail trip makes more sense than flying in many instances. Also, be cause of government subsidies, railroads have been able to invest in new services. France has been a leader in bringing new technology to the rails. Its Train a Grande Vitessse, or TGV (high-speed train), oper ates on new roadbeds at speeds in excess of 300 kilometers/ho u r ( 1 80 miles/hour) . There are n o grade crossings o n the new line because the train could not stop in time to m iss a vehicle on the tracks; it takes 2 miles for a normal stop and 1 mile for an emergency stop! These trains carry over 50 million passengers a year to 1 40 Euro pean cities. There are another 300 train units besides TGVs with 3000 scheduled departures per week. SNCF was faced with the task of devis ing new schedules to provide customer ser vice, while at the same time considering the profitability of its operations. Sabre Decision Technologies developed a yield manage ment system for American Airlines, and both Sabre and the railroad thought that the same principles could be applied to passenger rail
operations [see Chapter 21 for more details on yield management]. The alliance between Sabre and SNCF resulted in two new products, RailCap and RailPlus. RailCap allows the railroad to add new reservations capacity while RailPlus en ables SNCF to build new rail schedules. Im plementation of the two new systems was not easy; they tended to integrate both mar keting and operating decisions, and railroad employees in these two areas were not used to working together or with new technology. By showing that the two systems could re configure a schedule in a few months com pared to 2 to 3 years for the manual ap proach, the developers convinced skeptics that the technology had something to offer. One of the main advantages is that the systems allow a scheduler to see the total profitability of adding a section; he or she can observe both the expected revenue and the costs of running an extra train. The sys tems allows the railroad to run more scenar ios and reduces the number of empty shut tles t h at h ave to run each day. S N C F estimates that the two systems reduced op erating costs by 2 percent. Better schedules have also brought more customers and, with them, more revenue. Yield management is a process that can be applied in many industries. Sabre Deci sion Technologies has migrated this ap proach to planning operations to S N C F , cruise ships, hotels, a n d rental car firms. More than software, the company is transfer ring knowledge of a process that applies where customers make reservations to use some scheduled resource. The end result is better customer service and more profitable operations.
365
366
PART THREE: I N FORMATION TECHNOLOGY
which shows a network with multiple clients and servers.) In these cases evaluat ing the capacity and performance of the network is very difficult because it may be hard to find a comparable system running the applications you have in mind. Decisions on obtaining computers largely depend on the function for which they are being acquired. Many people first bought personal computers just to run spreadsheet analyses. Managers choose factory computers for how well they per form a specific task. One can still apply some of the considerations for larger com puters when considering other types, specifically: expandability and compatibility, ability to communicate with other systems, the type of software, the user interface, and vendor support. Organizations typically have a policy on what kind of computer configuration to obtain, and have professional IS staff members who provide advice on acquisi tion. The IT infrastructure, the servers and other computers that the IS staff or an outsourcer runs for the firm, is constantly upgraded by those responsible for pro viding IT services. Dealing with Obsolescence An ongoing problem in purchasing both hardware and software is obsolescence. The cost/performance curve for hardware continues to decline while new versions of packages appear about every six months. While cars improve each year, few of us can afford to buy a new automobile every 1 2 months. Is the same true for com puters? Very few applications ever disappear from computers, and new ones are al ways being added. It is fairly obvious, then, that the total amount of computing in the organization is always increasing. Higher powered computers seem to stimu late the creation of more sophisticated and powerful applications. The first spread sheet programs did calculations. Today's Lotus 1 -2-3 and Microsoft Excel offer presentation graphics and programming languages that make the original Visicalc look very crude. As a result, users apply ongoing pressure for new computers and software up grades. To some extent, the organization has little choice. While you might still be able to do word processing and run a spreadsheet on a l O-year-old PC, what you do is unlikely to be compatible with other users who have newer models with newer releases of software. The task of managing a large variety of computers and different versions of software is also formidable even if your support staff try to keep all equipment and software at the same level to make its job possible. Thus, as a manager, you will be forced into continual upgrades. That is one rea son why it is estimated over 45 percent of all U.S. capital investment is in infor mation technology. DEDICATED APPLICATIONS PACKAGES A dedicated applications package is a program or set of programs written for a specific application like order entry and production scheduling. This package is used for a specific application as opposed to a general application like word processing.
CHAPTER 1 4: SYSTEM ALTERNATIVES AND ACQUISITION
The major attraction of buying a package is to avoid having to develop a cus tom system. Custom programming is expensive and time-consuming. When a package is available, it should be considered. Another obvious advantage of using a package is cost savings. The package developer expects to sell a number of pack ages to recover the investment in developing it. The cost is thus amortized over a number of users. The cost to the developer, though, is usually higher than the de velopment of a single application would be since the package must be general enough to be used by a number of customers. This increased generality makes the package larger, more complex, and often less efficient to operate than an applica tion specifically developed for a single application. Some of the trade-offs, then, for a package are as follows: • •
•
•
•
Package generality versus ease of installation and use. Acquisition and modification costs versus the cost of developing the application within the organization. The elapsed time to install a package versus the time to develop the application within the organization. Operating efficiency of the package versus the alternative of a custom applica tion within the organization. Implementation problems of the package versus those of an application devel oped specifically for the needs of the organization.
The most serious problem with purchasing a package is the need for the organi zation to customize the programs for its unique situation. (This problem is most severe with dedicated packages such as accounts-receivable programs, which may affect the way the firm has been doing business for years.) Of course, although in dividual organizations always claim uniqueness, it is often easy to change routine procedures to suit a package. On the other hand, there are also legitimate reasons for maintaining uniqueness in the organization. We have stressed the importance of meeting users' needs and obtaining their involvement in the design of systems. Many systems developed on a custom tailored basis fail completely or never reach their potential. It seems that pack ages are even less likely to succeed because they have a tendency to impose a system on a user. What can be done to lessen the implementation problems of packages? The package vendors recognize this drawback and generally design packages to allow some custom tailoring. Two ways are often employed for providing flex ibility: the use of modules and the use of parameters. The first strategy provides a modular set of programs in the package. The user configures a custom applica tions package by selecting appropriate modules for a particular set of needs. Lit tle or no programming is required on the part of the user. Packages also make ex tensive use of parameters or data values to indicate unique features for a particular user. Often, the customizing features provided by the vendor of the package are insufficient for an organization. The less expensive packages may have to be accepted as is, but for more elaborate applications, the customer often finds it
367
368
PART THREE: I N FORMATION TECHNOLOGY
necessary to write custom code to modify the package. Sometimes the modifi cations are easy and require only the addition of some reports or the alteration of reports already in the package. Code modification can become quite exten sive and may involve rewriting significant portions of the package. One organi zation uses the rule of thumb that a package will not be considered if modifying it will cost more than 50 percent of the initial package cost. The important thing to remember is that the cost of a package is usually not just the purchase price. We must forecast and consider the costs of transition, modification, and maintenance as well. Establishing Criteria The information services department and a project team should agree on screening criteria for packages. Many times packages will be considered as alternatives to developing a system in-house. Table 14-2 lists some possible evaluation criteria for decisions on packages. The major reason for acquiring a package is the func tion it performs. We want to know how many desired functions are included and what effort is required to modify the package. It is also important to consider the user interface. That is, how difficult is it to use the package? How much information does a user have to supply? Is it simple to prepare and understand the input? Is the package flexible, and can it be used if the organization's requirements change somewhat? The evaluation team is also concerned with the package's response time as well as how much present procedures will have to be changed to use the package. Just as with hardware, it is necessary to evaluate vendor support. Updates and improve ments for the package should be forthcoming, so we are dependent on the vendor remaining in business. With software packages, documentation is important; the IS staff will maintain the package and may modify it. Finally, we must consider the cost. Remember we always underestimate how much it will cost to develop a comparable system our selves and overestimate the cost required to modify the package!
TABLE
1 4·2
CONSIDERATIONS I N EVALUATING SOFTWARE PACKAGES • • • • • • • • • •
Modifications required Installation effort User interface Flexibility Response time Changes required in existing system to use package Vendor support Updating of package Documentation Cost and terms
CHAPTER 1 4: SYSTEM ALTERNATIVES AND ACQUISITION
Making a Final Decision In this discussion, we are interested in whether a package qualifies for considera tion. Many of the criteria in Table 14-2 require analysis of package documentation by the systems analysis staff or programmers. We also should contact present users and ask questions about vendor claims and support. Almost all these criteria are subjective, which means several individuals should rank a package on each cri terion, for example, on a one-to-seven scale. The responses can then be averaged for each criterion and a score can be developed for the package. It may be desirable to divide the criteria into essential and nonessential groups. We can insist that a package get a "passing score" (established in advance) on each of the essential criteria to be considered for acquisition. Then we can exam ine the criteria to see if the package passes enough of them to be considered.
369
370
PART THREE: INFORMATION TECH NOLOGY
If a package is acceptable and is the only alternative under consideration, we will probably acquire it. However, if several packages are available, the ones that pass the screening test can be compared using ratings or through the scenarios de scribed earlier. If the package under consideration is an alternative to designing an in-house system, use the criteria established by the project team to evaluate the package in comparison with other processing alternatives. The users, then, help evaluate a package versus a custom-tailored application, and decide which would be best. If the user wishes to have the lower costs and faster development associated with the package, he or she will have to agree that all desired features may not be present. If the decision is for a custom application, the user must recognize that costs will probably be higher than the cost of a pack age and that it will take longer to develop the system. ENTERPRISE SOFTWARE PACKAGES Large applications such as SAP's Rl3 and similar products from Baan, Peoplesoft, and Oracle are still packages, but the tremendous scope of their impact makes de cisions about them much more challenging than the decision to buy Microsoft Of fice or Lotus SmartSuite. Enterprise software is designed to fulfill all the basic transactions processing needs of a firm, from entering orders through producing a product, accounting, preparing financial statements, and querying databases. Of course, you do not have to buy the entire package, but many of the benefits from enterprise software come from its integration. As an example, consider processing an order. A comprehensive enterprise soft ware package accepts the order, checks inventory, notifies the customer, schedules production if a product is not available, and tracks the order until it can be filled. The package creates an accounts-receivable entry when the order is shipped and makes the proper accounting entries when the customer pays the bill. All this ac tivity is reflected in the firm's financial statements. These packages cost multiple millions of dollars to purchase and implement, and can easily take several years. If you choose this alternative, the firm is com mitted to this package and to a costly implementation effort. What have you bought? Just as with any package, you have purchased debugged code, functions you probably would not have designed into a custom system, and a significantly shorter implementation time than custom development would allow. A decision to adopt SAP comes only once in many years, and you must comparison shop and study it just as you would any major business decision. Our comments on package programs still apply, but the scale of this acquisition decision demands significant research and management attention. PACKAGES FOR PCs Buying software for personal computers shares some of the issues with buying software for enterprise applications. We are still concerned with the user interface, user documentation, and speed of processing.
CHAPTER 1 4: SYSTEM ALTERNATIVES AND ACQUISITION
For most PC packages, modification is not an issue. These packages are too inex pensive for the vendor to customize for each customer. In order to protect future sales, the vendor rarely sells the source code for the program. The vendor does not encour age modifications because it does not want to support customers who make them. Research for a PC package is slightly different from that for other types of tech nology. A number of magazines conduct product evaluations, or the potential buyer can look at package documentation at a retail computer store, see the pack age running, and sometimes even obtain a demo diskette from the manufacturer. Some organizations have created internal consulting and support groups to help users with PC hardware and software acquisitions. These groups have packages to recommend and demonstrate for specific types of applications. Fortunately, the cost of much PC software is low enough that one can often afford to buy and use a package for several months or a year and then switch to something else. It is worth research and careful consideration, but there is nothing like trying out the software before buying it to determine the right choice. For generic applications such as spreadsheets, word processing, and presentation graphics, the support staff will encourage the adoption of a companywide standard. This standard makes it easier to share data and easier for the staff to offer support for the products. An Example We have discussed a number of acquisition scenarios in this chapter, ranging from buying a single package for a PC to outsourcing your firm's entire information processing function. A major university recently faced an acquisition decision that involved both hardware and software, which presents an interesting case study of an acquisition decision most people in the school now think was a mistake. The school was installing a fiber-optic backbone network on its campus. It needed to choose a vendor to provide the networking software for the system. In addition, the choice of network vendor would also determine which file servers to install. The computer center at the school sent proposals to a number of vendors; two returned acceptable proposals. Vendor A is a computer manufacturer with a strong support organization. Its networking software is proprietary, though it is based on a major PC software ven dor's networking system. This network required fairly expensive servers that ran on the Unix operating system. Vendor B provided the networking software that was already in use at the school and is the market leader in networking PCs. The school staff also had experience with this software because three or four of its net works were operating with it while the decision was made. Vendor B's network used PCs for servers, making hardware costs lower than for Vendor A. The computer center staff liked Vendor A, who they felt would provide extensive services and would better monitor and control their network. The staff convinced the dean responsible for making the decision that Vendor A was the best choice. Faculty with IT experience were in favor of Vendor B for the following reasons:
• The school had experience with the product from Vendor B. It would be throw ing away most of that experience and starting from scratch with Vendor A.
371
372
PART THREE: I N FORMATION TECHNOLOGY
•
•
•
The system from Vendor A was more complex than Vendor B 's. It required a great deal of memory on each client computer, which might make it difficult to run certain packages and the networking software simultaneously. It would be difficult to get outside help or hire people with experience with Ven dor A's products since most professionals knew Vendor B 's system. The more widely used system from Vendor B was better debugged than the newer product from Vendor A.
What happened? The decision was made to go with Vendor A. As you might ex pect, the implementation was a disaster. Students could not print in the PC labs be cause the network had significant problems handling printing. The entire network ing effort has discredited technology in the school. Emotions were so high that an outside review panel was asked to report on the computer center. It concluded the school was in great difficulty from having chosen Vendor A's product. In fact, it turns out that the school had the largest installation of this product! In addition, Vendor A has started to "resell" Vendor B ' s network software, raising the question of whether Vendor A would continue to support and enhance its own offering. Three years later, the school abandoned Vendor A and moved to Vendor B ! How did this disaster happen? The evaluation failed to consider important in tangibles such as the school's experience with Vendor B and the difficulties of finding and training staff for the complex system offered by Vendor A. In addition, it appears the computer center staff did not do an adequate evaluation. They failed to visit sites that used systems from both vendors and that would have been com parable to the school's environment. This example should serve as a warning that you must be extremely careful in making major hardware and software acquisition decisions, especially those that affect the entire IT infrastructure of the organization. You must take into account intangibles and management considerations in addition to the technical features of technology products. CHAPTER SUMMARY
1. Evaluating technology is an ongoing task for most organizations; large num bers of services and packaged programs are available. 2. The computer industry includes many different firms that sell hardware, soft ware, and services. 3. Today most organizations are interested in reducing the cost, time, and risks associated with custom applications development. The first strategy should be to look for a package that accomplishes your processing objectives. 4. If you cannot find a package, there may be alternatives such as using a DBMS for implementing the application. 5. Outsourcing is becoming increasingly popular for developing applications and for running all or part of a firm's technology. 6. There are a number of tradeoffs between doing the task internally and using an outsourcer. Management has more control over internal operations, but it must take a very active management role in IT under this alternative.
CHAPTER 1 4: SYSTEM ALTERNATIVES AND ACQUISITION
7. Because companies are continually developing new applications, there is in creasing demand for hardware and software. This demand means the firm is frequently faced with decisions on acquiring more computer equipment and more software. 8. The acquisition of large and midrange computers is fairly routine. If the firm has an architecture in place, that architecture may dictate which new comput ers to buy. 9. The IS staff will want to keep up with new technology in hardware and soft ware, both to provide the firm with a powerful IT infrastructure and to make the task of supporting hardware and software manageable. 10. Because packages are such an attractive option, it is important to purchase packaged software with great care. For dedicated applications, do a rough sys tems analysis and design to provide a benchmark for evaluating different packages. For general packages like a word processor, the organization will probably want to adopt a single standard in order to make it easy to share doc uments and to ease support requirements.
IMPLICATIONS FOR MANAGEMENT The "make or buy" decision is always a difficult one for management. The avail ability of new technologies in the marketplace and a movement by firms to get back to their core competencies have led many companies to select the "buy" op tion. Chrysler can get by with making 30 percent of the parts for its cars because it has EDI links with its vendors to make just-in-time manufacturing work. Because of the high cost and long time required to develop software, most managers look first at whether they can buy existing software and modify it if necessary to avoid programming an application from scratch. If you decide to buy, it is important to understand the technology and the application so that you can be an intelligent consumer.
KEY WORDS Benchmark Enterprise software Integrator Outsourcing Performance evaluation tool Scenario
RECOMMENDED READING Apte, D.; and R. Mason. "Global Disaggregation of Information-Intensive Services," Man agement Science. 4 1 , no. 7 (July 1995), pp. 1250-1260. (A paper presenting a frame work and discussion about where in the world an organization might choose to obtain processing services and/or outsource them.)
373
374
PART THREE: INFORMATION TECHNOLOGY
Aubert, B . ; M. Patry; and S. Rivard. "Assessing the Risk of IT Outsourcing," Proceed ings of the 31st Annual Hawaii International Conference on System Sciences." 1 998, VI, pp. 685-692. (An article classifying all kinds of business risks associated with IT outsourcing.) Bragg, S. Outsourcing: A Guide to . . . Selecting the Correct Business Unit . . . Negotiat ing the Contract . . . Maintaining Control of the Business. New York: John Wiley & Sons, 1998. (A well-written book featuring various outsourcing strategies and business implications.) Meyer, R. "Avoiding the Risks in Large Software System Acquisitions," Information Strategy. 14, no. 4, Summer 1998, pp. 28-33. (A clear article describing software acqui sition planning and strategy.) Ozkul, T. "Estimating Acquisition Loop Time for Time-Critical Real-Time Data Acquisi tion Applications for the Purpose of Selecting Appropriate Hardware and Software," The Journal of Systems and Software. 37, no. 3, June 1997, pp. 227-233. (This article presents various methods for selecting appropriate hardware and software packages for data acquisition.)
DISCUSSION QUESTIONS 1 . Why have established vendors been hurt by "open" architectures? 2. Why evaluate systems performance given today' s technology? 3. Describe the trade-offs in considering a dedicated package for a new application. 4. Why would management with an internal IS staff be interested in using a systems
integrator? 5. What are the drawbacks of mixing hardware from a large number of vendors? 6. Why should a company consider the use of applications packages? What are their ad
vantages and disadvantages? In what situations would you expect applications pack ages to be most satisfactory? 7. Is performance evaluation important for purchasing PCs? 8. How would you characterize an existing computer work load for performance evalua tion purposes? How would you include consideration for the changes in the work load that might occur in the future? 9. Why might an organization choose to outsource all its information technology? 10. What are the major differences between outsourcing the development of an application and outsourcing the operation of some part of your information technology activities? 11. Most organizations today have computers and software, all of which are supposed to work on a network, from different vendors. What are the potential problems with using products from many different sources? 12. What factors mitigate against the conversion to a different vendor's computer? How has the development and use of higher-level languages affected this type of conver sion? What do you expect the impact of database management systems is on conver sion to a new vendor? 13. Make a list of the types of questions and information desired for a survey of other users of an enterprise software package under consideration for acquisition. 14. How does the existing IT architecture affect the acquisition of new computer hardware and software? 15. What are the disadvantages of using some weighted scores for ranking competing pro posals for computer hardware and software? What advantages are presented by using scenarios for describing how the company would function under each new alternative?
CHAPTER 1 4: SYSTEM ALTERNATIVES AND ACQUISITION
16. Why is it not a good idea to be a pioneer with new hardware or software? That is, why
should a company wait before acquiring a newly developed computer system? How can the IS department avoid making frequent requests for additional computer capacity? What are the dangers in your strategy? How does the development of a plan for infor mation technology affect this problem? 17. What applications might the firm want to retain if it is planning to outsource some of its IT activities? 18. Why should applications packages be seriously considered as an alternative to pro gramming and implementing a system? What are the most significant problems with these packages? How can the ease of modifying the package be determined before its acquisition? 19. Compare and contrast the major sources of software. What are the advantages and dis advantages of each? 20. Who should be involved in the decision on new computer hardware? What about soft ware? Does the type of software make a difference? 21. What are the major differences between packages for PCs and for midrange and large computers? 22. Why do some programmers show a great deal of resistance to applications packages? 23. How can the vendor of an applications package make it more appealing to potential customers? 24. How does an "open" architecture provide purchasing flexibility for a firm? 25. There is a great deal of free or low-cost software available for PCs. What are the ad vantages and disadvantages of "shareware"? 26. Why might a systems integrator be faster in developing a complex application than your internal staff?
CHAPTER
14
PROJECT
Buying a PC Several of your friends are thinking about buying a new personal computer. Look through popular magazines such as PC and Byte for the advertisements from dif ferent mail-order PC vendors. Then develop a matrix comparing the features of different machines and their costs. Describe what features you would recommend for your friends in each of the following cases: • • •
•
The casual user who will do mostly word processing on the computer. The "power user" who will mostly run spreadsheets. The fan of GUIs and presentation graphics who wants to experiment with desktop publishing. The Internet surfer who downloads programs and graphics from the Web.
Be sure to explain the reasoning behind each of your recommendations.
375
376
PART FOUR
I I
I n this part of the book, we follow the life cycle of a system from its incep tion through final installation. From the considerations on organizational issues discussed in Part Two, we recommend an approach to systems analy sis and design in which users have control over the design process. The chapters in this part stress the roles of the manager and user in each stage of systems analysis and design. The systems analyst aids the user in mak ing crucial decisions and performs the technical tasks necessary to develop the system. Chapter 1 6 contains an appendix that provides a great deal of detail about the design of two different systems-one system follows struc tured design approaches and the other illustrates object-oriented design.
377
CHAPTER 1 5
il I
Outline The Design Task What Is a System? Multiuser versus Single-User Design
A Systems Design Life Cycle The Roles of Managers, Users, and Designers Potential Pitfalls in the Life Cycle
User-Oriented Design Problems with the Conventional View Design Team
The Spiral Model of Development Data Collection for Analysis and Design Observation Interviews Questionnaires Comparing the Alternatives
Structured versus Object-Oriented Design The Role of Structured Design Data Flow Diagrams An Example of Structured Design Object-Oriented Design A Comparison of Approaches
379
380
PART FOUR: SYSTEMS ANALYSIS AND DESIGN
Focus on Change The firm invests in applications of technology to change the organization by re structuring work, forming alliances with other organizations, altering reporting relationships and communications patterns, and in a myriad of other ways. The firm has to identify applications and then build them. The manager has an im portant role in developing applications that will create dramatic changes in the firm and industry: developing the idea for a system, allocating resources to it, participating in its design, and monitoring progress on the development project. For systems to transform the organization, they must be well designed and they have to work. THE DESIGN TASK The design of a new information system is a demanding undertaking. First we be come aware of an opportunity to use technology to gain an advantage or solve a problem with existing information processing capabilities. We assess the benefits of using IT to improve these procedures. Then we develop an abstract model of the current processing procedures, and a systems design team creates a new infor mation system. The team converts the new procedures into system specifications and finally into computer programs. The final stages of development include test ing, conversion, and operations. The design of an information system is a creative and labor-intensive task. It is creative because we are building a new set of information processing procedures, just as an architect designs a new building. Systems analysis and design is a human, intellectual task. There are some portions of design that can be automated, but most of the creative aspects require human thought. A recent consulting group survey reported that almost one-third of systems development projects were can celed before completion. Another half experienced dramatic cost and time over runs, and reductions in the features originally promised. There is much room for improvement in systems design. One helpful strategy is to have those who will use the system heavily involved in its design. What are the roles of the user and manager in systems analysis and design? In this chapter, we introduce the systems life cycle and discuss the resources avail able for developing new systems. We shall see that users and managers have cru cial roles in all aspects of systems analysis and design. What Is a System? In previous chapters we have seen many examples of information systems which consist of a number of interrelated components, only some of which are easily seen. For example, it is difficult to characterize the actions of individuals who are involved in making decisions as a part of an information system. The flow of in formation and the processing of data by computer programs and/or individuals can also be obscure.
CHAPTER 1 5 : BUILDING SYSTEMS: CREATIVITY WITH TECHNOLOGY
A The Standish Group is a consulting company that, among other activities, surveys compa nies about their success rates in developing applications of new technology. They report that the U.S. spends over $250 billion a year on developing IT and estimate that this ex penditure involves 1 75,000 projects. The av erage cost of a development project for a large company is over $2 m i l l i o n , for a medium-sized company, over $1 million, and for a small firm, about $400,000. Standish's survey suggests that compa nies will cancel some 30 percent of these projects before completion. Over half of the projects will experience cost overruns in the neighborhood of 1 90 percent of their original estimates. The cost of failing projects can be very high as well. The new Denver Airport could not open because its automated lug gage handling system was not working; the delay cost the city $1 . 1 million a day. Is there any good news? Companies re port that slightly more than 1 6 percent of software projects meet their budgets and
time schedules. However, completed proj ects have about 40 percent of their originally proposed features and functions. This picture is discouraging; what might be responsible? First, it is clear that develop ing a new application of information technol ogy is replete with uncertainty. It is very diffi cult to specify all des i red featu res and functions in advance so it is not surprising that time schedules and budgets at the fea sibility study stage are not accurate. Pur chasing a package is one solution, but im plementing a package has its own set of costs and risks. Sometimes firms abandon package i nstallations just as they cancel custom development projects. One lesson from these data is to specify as much of the system in advance as possi ble. The better one understands the func tions of an application of IT, the more accu rate the estimates should be for budget and completion time. In addition, it is important to actively manage a project to see that it does not get out of control.
One of the major tasks in systems analysis and design is to describe systems, both existing and proposed. Later in this chapter we discuss some of the tools available for preparing descriptions of systems, but first we present an overview of a system. Information systems can be described by five of their key components:
• • • • •
Decisions Transactions and processing Information and its flow Individuals or functions involved Communications and coordination
It is difficult to observe the decision process, though we can see and review re sults of a decision. Transactions are usually more visible, though many current systems use computer programs, which are not easy to understand, to process transactions. In principle, an observer can see information and its flows. Individu als can also be observed, but it is not always easy to figure out what information
381
382
PART FOUR: SYSTEMS ANALYSIS AND DESIGN
processing functions they perform. Systems also have implications for the way individuals communicate and for coordinating a firm's activities. Much of systems analysis and design, as mentioned above, consists of develop ing a sufficient understanding of a system to document it. Consider the following example of a simple inventory system: Decisions • •
•
What to reorder When to reorder it How much to reorder
Transactions and processing • • •
Place an order Receive merchandise Withdraw goods from inventory
Information and its flow • • • • • • •
Quantity on hand for each item Historical usage of each item Forecasts of usage Cost of each item Holding costs Reorder costs Interest cost (to finance inventory)
Coordination and communication • • • •
Communication between the warehouse and purchasing Communication between marketing (forecasts) and purchasing Communication with vendors Coordination of inventory replenishment among the above departments and with vendors
Individuals or functions involved • • • • •
Warehouse managers Stock clerks Receiving clerks Purchasing agents Vendors
Several other systems are also related to this one, including purchasing and accounts payable. This list serves only to describe the simple inventory system. We could fur ther document this system by going into more detail, especially concerning the flow of information. We could prepare dataflow diagrams, which are discussed later in this chapter, to help visualize how the system works. We could also document the various decisions in narrative form to provide a better understanding of the inventory system. Unfortunately, there is no one standard for what constitutes a system or how to document it. A number of different approaches are used, and individuals have to
CHAPTER 1 5: BUILDING SYSTEMS: CREATIVITY WITH TECHNOLOGY
develop descriptive techniques for conceptualizing a system. Most people find it easiest to start at a very high level and then fill in the details. In our example above, we stated the system is first concerned with inventory. To anyone with ex perience in working with inventories, this description should bring to mind how inventory systems operate in general. By listing decisions, transactions, informa tion flows, and functions, we add details to the inventory system. Further details can be added in top-down fashion as our knowledge about this particular system increases. In the end, everyone involved in learning about this system should share a common concept of it and an understanding of the documents describing it. Multiuser versus Single-User Design It is important to distinguish between multiuser systems and single-user applica tions when thinking about systems analysis and design. The types of systems dis cussed in this part of the text are largely multiuser systems, those used by a num ber of individuals in the organization. One group usually develops these systems for use by another group of employees. As such, development requires input from the individuals who are likely to be affected by the application. This kind of multiuser system should be contrasted with a more personal sys tem designed by the eventual user. Individuals frequently develop systems for their personal computers . These applications do not have the same requirements as multiuser systems because the systems designer is the systems user. He or she does not have to worry about developing a system for others to use nor does the system have to meet the needs of many different individuals. Even a personal computer system we use ourselves can benefit from good de sign practices, but the requirements are not nearly so stringent as for a multiuser system. In these larger systems, we must worry about editing, error controls, us able input screens, retrieval capabilities, and file design. We must design for others as well as for ourselves, a much more complicated task! A SYSTEMS DESIGiN LIFE CYCLE An information system has a life cycle just as a living organism or new product does. The various stages in the systems lifl! cycle are shown in Table 15-1. The idea for a new information system is stimula1 ed by a need to improve existing pro cedures or take advantage of a new opportunity. This leads to a preliminary sur vey to determine if a system can be developed to meet the objectives of the indi viduals suggesting it. If the results of the survey are positive, it is refined to produce a more detailed feasibility study. From the outcome of the feasibility study, a decision is made whether to proceed with the design of a system. If a pos itive decision is made, one of the alternatives sketched in the feasibility study is chosen for development. In systems analysis, the existing information processing procedures are docu mented in detail. During requirements analysis, designers attempt to learn what users expect the new system to do. One major task during this phase is to define the boundaries of the system. Does the problem concern only inventory control, or
383
384
PART FOUR: SYSTEMS ANALYSIS AND DESIGN
TABLE 1 5· 1
T H E SYSTEMS LIFE CYCLE
I nception Preliminary survey Feasibility study Existing procedures Alternative systems Cost estimates Systems analysis Details of present procedures Collection of data on volumes, input/output, files Requirements analysis Design Ideal system unconstrained Revisions to make ideal acceptable Specifications Processing logic Database design, input/output
Programming requirements Manual procedures Building the system Programming (or some alternative) Testing Unit tests Combined module tests Acceptance tests Training Conversion and installation Operations Maintenance Enhancements
should any new system also consider problems in purchasing when inventory has to be replenished? During analysis, data are also collected on the volume of trans actions, decision points, and existing files. The most challenging and creative part of the life cycle is the design of a new system. One approach to this task is to develop an ideal system relatively uncon strained by cost or technology. This ideal system is then refined until it becomes feasible. Designers must prepare detailed specifications for the system being de signed. They specify the exact logic to be followed in processing and the content structure of the file. Designers select input and output methods, and develop the formats for input and output. These requirements for processing, inputs, and out puts lead to the specification of programming requirements, which can then be turned over to a programming staff for coding. In the building stage, we develop the components needed to construct the sys tem. Often this involves writing computer programs to perform the logical opera tions of processing. In some firms, this task is done by a separate group of pro grammers. Other organizations use analyst-programmers: The same individuals who perform the systems analysis and design also code the resulting programs. Programs have to be tested carefully, first as units and then in combined modules. Usually a programming task is broken down into a series of smaller subtasks or modules. All the individual modules must operate together if the system is to work properly. During the final stages of testing, there will be some type of acceptance test in which users verify that the system works satisfactorily. Since one purpose of the new information processing system is to change exist ing procedures, training is crucial. All individuals have to understand what is re quired by the new system. When training has been completed, it is possible to un dertake conversion; it may be necessary to write special programs to convert
CHAPTER 1 5: BUILDING SYSTEMS: CREATIVITY WITH TECHNOLOGY
A There are a number of Web sites that pro vide information about new model cars. Auto-by-Tel, which used to operate only by phone, also has a Web site that refers cus tomer requests to dealers. The dealers pay Auto-by-Tel a monthly fee to receive the re ferrals; Auto-by-Tel provides the customer with the names of nearby dealers who are in its program. The customer then negotiates with the dealer directly Priceline.com has a different model; the customer describes the model of car and the price he or she is willing to pay. The cus tomer also indicates the date by which the car must be available and how far he or she is willing to travel to pick up the car. Priceline
searches for dealers willing to sell the car at that price, or who are w i l l i ng to make a counter offer, and sends the specifications by fax to the dealers. (Priceline withholds the custo mer's n a m e . ) The custo m e r pays Priceline $25 and the dealer pays $75 for its services. There is a $200 penalty if you don't buy the vehicle after a dealer has accepted your price. Priceline said that the design of its sys tem was fairly simple and that it only needed to add two Web servers and a fax distribu tion system. A clever idea, a straightforward systems design, and the infrastructure pro vided by the Web and I nternet have pro duced a different model for selling cars.
existing files into new ones or to create files from manual records. Finally, after all these stages are complete, a team installs the system. The operational stage begins after the problems of installation are resolved and the organization has adjusted to the changes created by the new system. The sys tem now operates on a routine basis. This does not mean we do not change the system; however, there is a constant need for maintenance and enhancements. Maintenance is required because programs inevitably have errors that must be corrected when they appear. Because of the creative nature of design, users and the
385
386
PART FOUR: SYSTEMS ANALYSIS AND DESIGN
FIGURE 1 5-1
Resources required during each stage of the life cycle for a typical system.
IS staff may not have communicated accurately, so certain aspects of the system must be modified as operational experience is gained. As users work with the sys tem, they will learn more about it and will develop ideas for changes and en hancements. It is unreasonable to consider any information system "finished"; the system continues to evolve throughout its life cycle if, in fact, it is successful. Figure 1 5-1 shows the resources required during each stage of the life cycle for a typical system. (The pattern of time required would be much the same.) Few re sources are usually required during the inception and feasibility study. Once sys tems analysis is begun, more expenses are incurred as analysts and users work on the system and its design. These stages culminate in the preparation of specifica tions for building the system. The building stage is intensive and requires the most resources. Often building involves writing a large number of programs. For a large project, the entire design process can last two or more years, of which more than a year may be required to build the system. Training will occur in parallel with the later stage of building the system, and finally the system will be converted and in stalled. After this time, the system reverts to operational status and is run on a rou tine basis. The resources required at this stage are steady, with some increases as the system becomes older and more changes are requested. It is important to spend adequate time in analysis and design rather than rushing into development. If a system is well specified, there are fewer changes during programming. These later changes often require major redesign of programs and
CHAPTER 1 5: BUILDING SYSTEMS: CREATIVITY WITH TECHNOLOGY
files, a very time-consuming and costly process. The entire systems life cycle can be compared to constructing a building. Changes are relatively inexpensive in the early conceptual stages. They become a little more expensive at the blueprint stage and exorbitant once the walls are erected. Systems changes are much the same. In the conceptual stages of analysis and design, they are reasonable. However, while programs are written and some are complete, major design changes have the po tential for creating huge time and cost overruns. THE ROLES OF MANAGERS, USERS, AND DESIGNERS Users, managers, and the information services staff interact in a number of ways during the analysis, design, and operation of information systems. In this part of the text on systems analysis and design, we often refer to the responsibilities of each of these groups in the development of successful systems. Because this task is so complex and demanding, it is essential that all three groups cooperate during the analysis and design process. Table 1 5-2 restates the stages in the systems life cycle and suggests the appropriate roles of users, managers, and the IS staff. The user initiates the preliminary survey by suggesting a potential application. The information services department responds with a rough estimate of its desirabil ity and with several alternative systems, such as a package or a custom-developed system, each meeting some percentage of the users' needs. Management must ap prove the basic suggestion and the idea of a new application for this area of the firm and participate in setting objectives for any new system. In fact, it appears that one important role for management is to be a champion for the system. We have ob served a number of cases where systems failed because of the lack of a high-level sponsor and where they succeeded with such a champion. A preliminary survey evaluates each alternative on criteria developed by a se lection committee. The selection committee, with management participation, au thorizes a feasibility study, possibly eliminating some alternatives suggested in the preliminary survey. The IS staff conducts the feasibility study with help and advice from users. Users conduct an analysis of the existing system to evaluate various alternatives on criteria specified by the selection committee. Management reviews the feasibility of the proposed alternatives and develops an understanding of what the system will accomplish. The selection committee chooses which alternative to implement with participation and review by management. Possibly the committee selects the alternative of no new system, in which case the application may be held in abeyance until changing conditions make it feasible. If the decision is made to proceed with the development of a new system, users and the IS staff collaborate to analyze the existing system. Users explain existing processing procedures and provide data. The IS staff uses this information to doc ument the existing system and help establish the boundaries of a new system. Management has a key role to play in this stage. It must provide adequate re sources both for the IS staff and for users. It may be necessary to hire additional staff so users can participate or hire additional analysts to work on the project.
387
388
PART FOUR: SYSTEMS ANALYSIS AND DESIGN
TABLE 1 5·2
RESPONSIBILITIES DURING THE SYSTEMS LIFE CYCLE
Stages
Users
Management
Information services staff
Inception
I nitiate study, suggest application, sketch information needs, describe existing processing procedures
Serve as sponsor, approve area for application, set objectives
Listen to requirements, respond to questions, devise alternatives, assess using rough estirnates, prepare prelirninary survey
Feasibility study
Help evaluate existing system and proposed alternatives, select alternative for design
Review feasibility, understand proposal, choose alternative
Evaluate alternatives using agreed-upon criteria
Systems analysis
Help describe existing system, collect and analyze data
Become system champion, provide resources, attend reviews
Conduct analysis, collect data, and document findings
Design
Design output, input, processing logic; plan for conversion and forecast impact on users; design manual procedures; remain aware of file structures and design
Encourage user design, provide rewards, attend reviews, plan impact
Present alternatives and trade-offs to users for their decisions
Specifications
Review specifications, help develop specifications for manual procedures
Understand high-level logic, key features
Combine users' needs with technical requirements to develop specifications, develop technical conversion plan
Building
Monitor progress
Monitor, provide buffer, extra resources
Organize programming, design modules, code programs, report progress
Testing
Generate test data and evaluate results
Review
Test program modules individually and in entire system
Training
Develop materials, conduct training sessions
Review
Aid in preparation of materials and train operations staff
Conversion and installation
Phase conversion, provide resources, conduct postimplementation audit
Attend user sessions, demonstrate management commitment
Coordinate conversion, perform conversion processing tasks, help in postimplementation audit
Operations
Provide data and utilize output, monitor system use and quality, suggest modifications and enhancements
Monitor
Process data to produce output reliably, respond to enhancement requests, suggest improvements, monitor service
CHAPTER 1 5: BUILDING SYSTEMS: CREATIVITY WITH TECHNOLOGY
Next, the design of a new system begins. We advocate that users design their own input and output and basic processing logic. The information services depart ment acts as a catalyst, presenting alternatives for users to consider. Management encourages user design through its own attendance at review meetings. Manage ment may provide special rewards, prizes, or other incentives to encourage user participation in design. At this point, management must also plan for the impact of the system on the organization. Will the structure of the organization be changed? How will work groups be affected? What will specific individuals do as a result of the system? A plan for conversion should be developed, including a forecast of the system's impact on all potential users. The IS staff develops detailed specifications based on the logic and require ments specified by users and prepares a technical conversion plan. The users on the design team review the technical plans and work on the development of speci fications for manual procedures. It is vitally important at this stage for both users and managers to understand the system. Users must be familiar with the output, input, and processing logic. Management must understand the overall flow of the
389
390
PART FOUR: SYSTEMS ANALYSIS AND DESIGN
system and be aware of key decisions. For example, management should be aware if inventory items are to be grouped into classes and different reordering rules ap plied to each. Management should help set the classification and reorder rules, and understand how the logic is to work. The users' role and management's role during programming are to monitor progress. Is a project schedule maintained and are resources reallocated as neces sary to achieve installation on schedule? The bulk of the responsibility during this design stage rests with the information services department. The IS staff must de sign program modules, code them, and test them alone and in combination. Man agers should realize they need to help when problems arise. The development of an information system is similar to a research and development project; it is very difficult to anticipate every contingency. There will be project slippages, budget overruns, and other problems. The role of management is to provide a buffer for the project and furnish additional resources where they will help. During testing, users should define data for test programs and attempt to gener ate data with errors to ensure that the system will catch them. Users should care fully examine test results and evaluate the adequacy of processing. Management should also participate in the reviews of data processed by the system. Some kind of acceptance test should also be conducted by the information services depart ment, and the results should be evaluated by users. A parallel test of old and new procedures or pilot studies may be used for this purpose. Training is essential for smooth conversion and installation. Users should de velop materials and actually conduct the training sessions whenever possible. Managers remain aware of the training program, attend occasional sessions to communicate support for the system, and check that their knowledge of the system is accurate. Training can often be combined with testing. The preparation of test data serves to help train users. The IS staff aids in the preparation of materials and trains the operations staff. Conversion is a crucial part of the systems life cycle and should be done in phases if possible. For example, can one department or geographic area be con verted first? The information services department coordinates conversion and per forms conversion procedures such as creating initial files for the new system. Users and the IS staff should jointly conduct a postimplementation audit and re port the results to management. How well does the system meet specifications? How good were the specifications? That is, how do users react to the system now? How do the original estimates compare with what was achieved? These data can be helpful in making estimates for future projects. Finally, during operations, users furnish data for input and work with the sys tem. Users and management will probably suggest enhancements and modifica tions to the system over time. The information services department itself should also look for improvements and respond to modifications suggested by users. Potential Pitfalls in the Life Cycle It is widely recommended that stages in the systems life cycle just discussed be followed. When we have seen them followed rigorously as a checklist, however,
CHAPTER 1 5: BUILDING SYSTEMS: CREATIVITY WITH TECHNOLOGY
the result has usually been systems that fail. What is wrong with the life cycle? Is the concept invalid? There are several major difficulties with rigidly following the stages listed in Table 15-1 in the development of a system. First, the stages tend to focus attention on a particular design approach. We shall see several alternatives to conventional design in subsequent chapters. The steps in the life cycle also imply that the analyst is in control of the design process. If a de sign team works under this impression, there will be too little participation by users. A very serious shortcoming of the life cycle model is that many analysts seem to interpret it as requiring the development of only one alternative. Users and man agers need to have a series of options from which to choose. They are poorly served by designers who provide a single design for a new system rather than one with alternatives to the status quo. There may be ways to shorten the life cycle and to skip certain stages. Most discussions of the life cycle do not suggest shortcuts in development. The systems life cycle provides a complete list of tasks, but we need to be flexi ble in how those tasks are accomplished and in what alternatives are presented to management. USER·ORIENTED DESIGN Problems with the Conventional View In the conventional approach to systems analysis and design described above, the analyst is a skilled leader. The analyst interviews users, collects data, and returns to the information services department to create a new system. Instead of viewing the analyst as the designer of the system, we recommend strongly that users de sign their own systems. Does this joint approach mean users actually undertake some of the tasks normally carried out by the analyst? The answer is definitely yes. Our recommended approach raises two questions. First, why should users as sume this role? Second, how can they do so? Our experience indicates that users are capable of responding to this approach and that successful results are possible. A more user-oriented approach to design may require deviations from the stan dard systems life cycle. Although the conceptual steps represented in the cycle may be followed, innovations will be included. For example, design is often facili tated by prototyping. A prototype is a smaller-scale version of a planned feature for a new system. A good example is sales forecasting. We can code the new fore casting routine on a personal computer and analyze past data for a limited number of products. Users will be intimately involved in this test so they can provide feed back on the prototype and evaluate its output. When they are satisfied, the proto type can be programmed in final form with more error routines, data manipulation features, and so forth, which had been excluded to keep the prototype simple. As a user, you must be sure you have adequate input in the design process. The professional systems analyst never uses the system-he or she moves on to another system after completing yours. Users often figure out too late that they are stuck with an inconvenient or unusable system. If you insist on influencing the design of the system and develop ownership of it, the chances for success are much greater.
391
392
PART FOUR: SYSTEMS ANALYSIS AND DESIGN
Design Team To coordinate users and the IS department staff, we recommend the formation of a design team with a user as head of the team. Having a user in charge makes the users' role apparent, ensures time will be available from other users, and demon strates a strong commitment to users on the part of the information services de partment. Normal job activities should be reduced for the user in charge of the de sign team. In case there are too many individuals for all of them to be involved, liaison representatives are suggested. These people interview other users and brief them on the system as it is developed. They are responsible for soliciting participation in the phases where it is meaningful. The IS department's systems designer guides the design team, teaching the tools and techniques necessary to complete the design and providing required technical advice and support, for example, by developing detailed file structures after users complete the logical database design. Systems designers monitor the project, describe the different stages, and help to schedule them. The actual analy sis and design work is done by the users with the assistance of the analyst, which is the opposite of how it is done in conventional systems design. THE SPIRAL MODEL OF DEVELOPMENT The development approach presented in this chapter, which features the systems development life cycle, is sometimes called the waterfall model: each stage flows
CHAPTER 1 5: BUILDING SYSTEMS: CREATIVITY WITH TECHNOLOGY
FIGURE 1 5·2
The spiral model of design shows the source of objectives, constraints, and alternatives.
into the next. We have indicated that the reality is different; designers revisit the stages in an iterative fashion. One of the first people to recognize the shortcom ings of the waterfall approach was Barry Boehm, who developed the spiral model of development (Boehm, 1 998). An extended model is shown in Figure 1 5-2 (Boehm et aI., 1998.) The model extends the waterfall approach by recognizing the different cycles. It also incorporates risk analysis, and makes clear the places where the developer or client may want to terminate a project. The approach is one of incremental development. You might not design the ideal system entirely in the beginning, but instead define the highest priority features and then go back to fill in the details . The spiral model defines four major activities within its lifecycle:
1. Determine the system's objectives, constraints, and alternatives; what processes does it affect? What products does it produce? 2. Evaluate alternatives and identify major sources of project risk. 3. Define the product and processes involved. 4. Plan the next cycle; partition the system into subsystems and consider termi nating the project if it is too risky. The extended model shown in Figure 15-2 adds three activities at the beginning of each spiral:
1. Identification of the key stakeholders for each subsystem; who will the system impact? Who needs to support the development effort? 2. Determine how to make the system contribute to achieving stakeholder goals; how can a successful system be seen as a "win" for the stakeholder (hence the name of this variation, the WinWin spiral model)? 3. Negotiate and reconcile differences so that developers and stakeholders all "win."
393
394
PART FOUR: SYSTEMS ANALYSIS AND DESIGN
The spiral model features iterative development beginning at the center of the circle and working outward. Successive iterations follow as more complete ver sions of the software are built. Unlike a linear trip through the systems life cycle, the spiral model makes it clear that design is a circular process. One designs the overall objectives of a system, and then divides it into subsystems, each of which has a life cycle or spiral of its own. The model is a guide that can help deliver systems faster to the client; it is based on a continuous refinement of a system, not unlike a prototyping approach. Explicit points to assess risk are a way to help manage development. The model recognizes that you cannot know everything in advance and that you will discover more information on each cycle. Models like this are used infrequently in business organizations because professionals are not always aware of them and because they require time to use. The high failure rate of projects, however, is a good argu ment to try something new like the spiral model. DATA COLLECTION FOR ANALYSIS AND DESIGN What techniques are available to the design team for collecting data? As discussed earlier, the objective is to develop an understanding of key decisions, communica tions, and coordination requirements, and how they are supported with informa tion. The team needs to examine decisions, the flow of information in the organi zation, communications patterns, and the types of processing undertaken. Observation One technique for collecting data on a process is to observe that process. Fre quently in systems analysis and design we will "walk through" a system, observ ing crucial information flows and decision points. Then we may use one of the graphical techniques described later in this chapter to document our understanding of how the system functions. Observations can also be quite structured. We may develop a rating form of some type to collect data on the frequency of inquiries, say, in a credit office. The analyst prepares a form showing the possible inquiries and then, during a sample of different days and hours, codes the actual inquiries. Interviews The systems analyst spends a great deal of time interacting with others, particu larly in interview settings. Interviews have varying degrees of structure. For a first meeting, there may be no structure at all; the analyst may be getting acquainted with the user and gaining a broad understanding of the problem area. Often, as the project progresses, the analyst conducts more structured interviews. The analyst may wish to prepare in advance an interview schedule containing the questions to be asked and the points to be covered. The main thing is to be prepared. Questionnaires A questionnaire allows us to obtain data from a relatively large number of people at a reasonable cost. A questionnaire can be thought of as a structured interview form
CHAPTER 1 5: BUILDING SYSTEMS: CREATIVITY WITH TECHNOLOGY
TABLE 1 5·3
SAMPLE INTERVIEW/QUESTIONNAIRE ITEMS
1 . Please describe your job. 2. With whom do you interact in your work? 3. What are the key factors in your work unit's success? 4. What factors are critical for your personal success? 5. What type of information and data do you use in your work? 6. Where does it come from? What do you do to change it in some way? Where does it go after you have worked on it? 7. What major bottlenecks exist in your sources and use of information and data? 8. What kind of technology do you use? 9. What do you like about your current technology platform? 1 0 . What are the drawbacks of your ciJrrent technology platform? What problems do you have? How do you resolve them? 1 1 . If you could have any technology you wanted, what would it look like? 1 2. If you could redesign the entire work unit here, what would the flow of work look like?
with questions designed so they can be answered without a face-to-face encounter. The design of a good questionnaire is a difficult task. Although the idea is an exten sion of a structured interview form, the questionnaire is, in principle, capable of being completed by the respondent alone without an interviewer present. Table 1 5-3 presents some examples of questionnaire and/or structured interview questions. Comparing the Alternatives Both questionnaires and interviews are important for the analyst, though inter viewing will probably be used more often. An interview makes it easy to follow a new tangent. The respondent is not constrained by the limitations of the questions but can expand in other directions. If the question is ambiguous, the interviewer explains what is desired. Interviews are the best technique in an unstructured set ting and when it is necessary to probe issues in depth. Questionnaires offer the advantage of being relatively inexpensive to administer to a large group of respondents. They are well suited to expanding data collection be yond the interview. For example, assume a system is developed for a number of sales representatives nationwide. If the firm has 500 sales representatives, it is impossible to include all of them on a design team. Instead, we would use liaison representatives chosen as typical of the types of salespersons on the force. This group might assist in developing a questionnaire for the rest of the sales force, previously uninvolved in the design process. The questionnaire could explain some of the chosen trade-offs and characteristics of the system to all potential users to obtain their input and feedback. STRUCTURED VERSUS OBJECT·ORIENTED DESIGN In response to the high failure rate for new systems (that is, many systems do not meet their original specifications or time and budget targets), we have seen the development of two approaches designed to improve the chances for suc cessful development. Both approaches emphasize logical and structured views
395
396
PART FOUR: SYSTEMS ANALYSIS AND DESIGN
of design. The first of these approaches is called structured design while the second is known as object-oriented design. The Role of Structured Design
What is structure in design? Basically, we try to take a disciplined, step-by-step approach to reduce complexity. A good example is top-down design; this philoso phy means that the designer first concentrates on an overview, then moves to suc cessive levels of detail. If at any step the designer becomes confused, he or she backs up one level to a diagram with more of an overview. The major purpose of this approach is to improve understanding and communication. The process is very similar to the set of plans developed by an architect. When a client asks for a new building to be designed, the architect develops rough sketches and adds detail over time. In presenting drawings to the client or even to construction workers, the architect does not provide a first page with the details of the electrical wiring ! Instead, we usually find that the first page is a perspective of the building. The next page might be four side views, followed by a page with a high-level floor plan. As each page is turned, we find more detail. Data Flow Diagrams
One of the most popular structured approaches to design is the use of data flow diagrams (see Figure 1 5-3). Compared with traditional flowcharts, the data FIGURE
1 5-3
Data flow diagram symbols.
CHAPTER 1 5: BUILDING SYSTEMS: CREATIVITY WITH TECHNOLOGY
flow diagram (DFD) is far less complex; there are only four symbols used for the highest level of detail. The DFD approach is more than just the symbols. It is important for the analyst to exercise discipline in preparing the charts. The recommended strategy is top down: begin with a high-level diagram and place succeeding levels of detail on subsequent pages. In addition, because adding detail makes the drawing cluttered, the analyst should take one process or subsystem and explode its detail on a sepa rate sheet of paper. DFDs can easily be read and prepared by users. One of their most important contributions is to facilitate understanding among all of those in volved in a design project. An Example of Structured Design
Imagine that a group of entrepreneurs decides to open a mail-order business sell ing software for personal computers. A customer sends in an order form, and employees of the business ship the software to the customer. Figure 1 5-4 is a high-level DFD for this firm. At this level, we see the basic flow of an order coming to the firm and a shipment going to the customer. Before shipping an order, an employee must look at an inventory record and check the customer's credit. Figure 1 5-5 presents the next level of detail. We see that the first action is to check the inventory to see if the software program ordered is in stock. If so, the employee places the order in a file marked "to be filled." The warehouse staff re moves orders from this file, finds them in inventory, packages the programs, and sends the shipment to the customers. If at any point you lose track of the process, it is necessary only to back up one or two diagrams to get an overview. In Figure 1 5-6, the designer addresses the question of what to do when the warehouse is out of stock. Management decides that back-ordering is probably not
FIGURE 1 5·4 Overview of mail-order business.
397
398
PART FOUR: SYSTEMS ANALYSIS AND DESIGN
FIGURE
1 5·5
The next level of detail.
feasible as the customer will look elsewhere for the program rather than wait. However, it is important to reorder when stock is low or entirely gone. If we need more merchandise, an order must be placed with a supplier. There is also a path from warehouse picking to the reorder process if the inventory records do not ex· actly match the warehouse contents. Here one wants to check the warehouse care fully and then reorder if in fact there is nothing in inventory. Figure 1 5-7 adds more detail to the reorder process and includes an accounts receivable process. We see that the firm must check in merchandise when it is received from suppliers and that the goods are eventually placed in inventory. Accounts receivable are important if the firm is to stay in business ! You must send an invoice to the customer with the shipment of goods and create a receiv ables record. It would be possible to expand Figure 1 5-7 further, but the diagram is begin ning to get cluttered. At this point, the designer would probably take each process and treat it as a subsystem for further explosions. For example, it would be possi ble to treat the accounts-receivable process as a subsystem and generate several pages of greater detail on how the firm creates and processes receivables. This example illustrates what we mean by design and logic. The managers of this company are creating the various information flows and processing steps in their
CHAPTER 1 5: BUILDING SYSTEMS: CREATIVITY WITH TECHNOLOGY
FIGURE 1 5·6
Reorder plan.
new firm. They must design different order-entry procedures and identify the trade offs among them. For example, they may choose to have customers submit orders • • •
• •
On paper By fax By telephone with a clerk filling out a paper order or entering the order directly in a computer Via the Internet Any combination of these options
In making this choice, the managers might trade off factors such as cost, customer service, and development time.
399
400
PART FOUR: SYSTEMS ANALYSIS AND DESIGN
FIGURE
1 5·7
Receipt of goods and accounts receivable.
When the managers decide, for example, to install a toll-free telephone number and have order-entry personnel enter orders directly in the computer, they have de signed one part of the system. If managers want customers to order electronically from the Internet, they are also specifying one part of the system's logic. When the managers identify the questions the clerk is to ask the customer and what he or she is to type in the computer, they are designing the processing logic. They could de cide to identify the customer by phone number or by zip code, last name, and first initial. Based on this input the system would retrieve data about the customer (if he had ordered before) such as his complete address. Design is the process of cre ating this new information system.
CHAPTER 1 5: BUILDING SYSTEMS: CREATIVITY WITH TECHNOLOGY
Object·Oriented Design
There is great interest in a conceptual approach to programming and systems analysis called object-oriented analysis. This approach to design is tied very closely to programming: software becomes a collection of discrete objects that in corporate data structure and behavior. An object is a representation of some real world thing and a number of specific instances of that thing. For example, we could define a Ford Explorer as an object. Objects encapsulate attributes and ser vices; this Explorer has four doors and four-wheel drive. The object is the Ex plorer, which is stored with its attributes of four doors and four-wheel drive. All objects have an identity and can be distinguished from one another. A class describes a group of objects with similar properties, common behavior, and common relationships with other objects. The Explorer is a member of the Ve hicles class. The grouping of objects into classes makes it easier to work with ab stractions. The designer can think about the system at the level of the class without having to bother with individual objects in the class. There are methods or proce dures associated with each class; they apply to the objects in the class and change some attribute. The same method may apply to different classes, but it may take on different forms in different classes. This characteristic of a method applying across classes, changing its implementation to match the class, is called polymorphism. In a conventional system, methods would be programs or routines for processing objects. A link connects different object instances; for example, Mary Smith (an object) works for (a link) the Widget Company (an object). Links with common character istics are grouped into an association. Based on what we have seen in past chap ters, it may help to know that links and associations are often implemented as pointers between objects and classes. Objects communicate by sending messages. As a result, one object cannot directly access the object in another class, which means that objects are encapsulated or protected from damage from other objects. The message generally results in the execution of some method of processing that is stored with the object. Different authors describe this processing as done through methods, procedures, or services. To build an object-oriented model, you identify the classes and objects in the problem domain. Class diagrams contain classes and show their relationships, while object diagrams show how objects send and receive messages. Over time, one builds class libraries: an objective of this approach is to reuse software. For example, a class and its objects for an inventory system might also be used in a production control system. Reuse is intended to reduce the amount of time spent and the cost of developing applications. Programmers implement object oriented systems with languages such as C++ (C enhanced with features to sup port object-oriented programming), Java or Smalltalk, one of the first object oriented languages. As an example, assume you are to develop a system to manage corporate vehi cles. The object of interest is a vehicle. There are many instances of vehicles (cars, trucks), so an object tells us something about a class of real-world things.
401
402
PART FOUR: SYSTEMS ANALYSIS AND DESIGN
FIGURE 1 5·8
An object classification with inheritance.
Instances of vehicles have different attributes (wheels, engines). Figure 1 5-8, a classification structure for vehicles, shows that cars are one type of vehicle. We are interested in land vehicles with internal combustion engines. Within the sub class of cars are vehicles with the following attributes: four wheels, doors, and a body. Cars can be off-road or on-road. An off-road car has four-wheel drive and high ground clearance, and so on. A very significant concept in object-oriented analysis is inheritance. Each in stance of an object inherits the properties of its class. An instance of an on-road car, a Ford station wagon, inherits all attributes above it in the hierarchy. It is a land vehicle with an internal combustion engine, and it has four wheels, doors, a body, regular tires, and normal ground clearance. An important characteristic of object-oriented analysis is communications through messages among different objects. These messages may be in the form of services that are performed for the objects. One example of a service is to register a vehicle and issue license plates. Repairing a vehicle is another kind of service. The message triggers a method or routine stored with the object to change some attribute
CHAPTER 1 5: BUILDING SYSTEMS: CREATIVITY WITH TECHNOLOGY
Mechanic Object Message: Repaired
FIGURE 1 5·9
Message passing and encapsulation in object-oriented systems.
of the object. For example, a message from a mechanic object might say the Ford wagon attribute "status" should be changed from "broken" to "in service." Figure 1 5-9 shows an example of objects communicating through a message. At time t the Ford wagon object is broken. At time t + 1 a mechanic object sends a message to the Ford wagon object indicating that the mechanic has repaired the car. This message activates a method or procedure to change an attribute of the Ford wagon object. The results of that change are shown at time t + 2. The Ford wagon object now has an attribute that indicates the car is in service again. Since the routine that makes the change is stored with the Ford wagon object, it is possible to change other parts of the system without changing this object. Other objects also do not have the ability to directly modify the Ford wagon object, re ducing the chance for errors. If you change some part of the system but continue to send messages in the same format as before the changes, there is no need to modify the Ford wagon and other automobile objects in its class. This encapsulation of the object and the methods for changing its attributes make it easier to change one part of a system without having an unanticipated impact on other components. Design incorporates identifying objects, the relationships among objects, and the services that are performed involving the objects. A set of steps for object oriented analysis adapted from eoad and Yourdon ( 1 990) is: 1. Define classes and objects to form the highest "layer" of the analysis. 2. Proceed to define the detailed structure of classes and objects such as one-to many relationships (very similar to entity-relationship models) and inheritance. 3. Define the methods to be performed and the messages that will trigger methods. 4. Define the attributes of classes.
403
404
PART FOUR: SYSTEMS ANALYSIS AND DESIGN
FIGURE 1 5· 1 0
Object structure diagram.
There are several approaches to object-oriented design depending on the partic ular author one follows. There are a variety of design documents that serve the same role as DFDs in structured design. The first of these is an object structure diagram shown in Figure 1 5-10. This model identifies the object classes involved in an application and relationships between objects. The diagram can be used to show inheritance, aggregation, and attributes of objects. Figure 1 5- 1 1 shows an object interaction diagram. We see the objects involved in recording the assign ment of a vehicle to an employee and arranging the repair of that vehicle when necessary. A transactions sequence diagram, sometimes called a "use case," models the possible ways of using a system. Each transaction sequence describes a service the user wants from the system. It should show what is required to com plete some unit of work that is significant from the user's perspective. Transac tion sequence diagrams also help develop the transaction structure diagram by showing objects that may have been omitted in the design so far. Figure 1 5 - 1 2 is an example o f the transaction sequence invoked when a driver needs t o have
CHAPTER 1 5: BUILDING SYSTEMS: CREATIVITY WITH TECHNOLOGY
FIGURE 1 5·1 1
Object interaction diagram.
a company vehicle repaired. In the figure, the user contacts the mechanic to request a repair. The mechanic takes the vehicle and diagnoses its problem(s). He or she then requests a part from the spare parts inventory and uses it to re pair the vehicle. The final diagram we shall discuss is one that models the interaction among objects. As we saw in Figure 1 5-9, an object-oriented system operates by sending messages among objects. Specifying this interaction is a key part of the design process. Figure 15-12 shows the interaction among the objects in our vehicle sys tem when the transaction is to arrange a repair of the vehicle. By specifying simi lar diagrams for all the objects and transactions in the system, one completes the logical design of an object-oriented system. In completing the design, Yourdon et al. ( 1 995) also recommend developing an object life cycle diagram that shows how objects change over time. For example, a vehicle in our system changes from "broken" to "fixed," on one or several occasions. A life-cycle view would show the vehicle coming into the inventory of vehicles, a history of possible repairs and enhancements (for example, a new set of tires), and the final disposition of the vehicle. Object-oriented analysis is relatively new. It appears very promising and is the appropriate design approach if you plan to use object-oriented programming to implement a system.
405
406
PART FOUR: SYSTEMS ANALYSIS AND DESIGN
FIGURE
1 5·1 2
Transaction sequence or use case diagram.
A Comparison of Approaches
While it may not be readily apparent, structured methodologies and object-oriented approaches are quite different in underlying philosophies. There is no one stan dard methodology for each approach. Different authors propose different nota tions and design steps for both structured and object-oriented design. However, all these authors agree on certain features for each approach. Structured method ology is based on the notion of functions; programs consist of modules to meet functional requirements. Function and procedure are the primary focus of this approach, and functions or processes share data. The emphasis is on process modeling rather than on data modeling, and analysis proceeds in a top-down manner. In object-oriented approaches, programs consist of interrelated classes of ob jects; data and procedures are encapsulated within the object. The analysis pro ceeds from the bottom up. Objects communicate with each other by sending mes sages to another object, which in turn, responds to the message. One uses object-oriented programming languages designed or extended to support objects, classes, and all the characteristics of this development approach such as inheri tance, encapsulation, and polymorphism. Object-oriented approaches to design are discussed extensively today, though only a small proportion of companies use the methodology. It is not clear if this approach will, in fact, provide substantial benefits until we have more experience with it.
CHAPTER 15: BUILDING SYSTEMS: CREATIVITY WITH TECHNOLOGY
CHAPTER SUMMARY
1. Systems analysis and design is an activity that requires teamwork among man agers, the information services staff, and users. It is a creative and exciting process that can bring about substantial change in the organization. 2. It is important to appreciate the difference between designing an application for yourself, say, using a spreadsheet on a PC, and designing an application that will be used by a number of individuals in the organization. 3. Traditionally, we have conducted multiuser design following a life cycle model. 4. In designing applications, managers, users, and the professional designers all have important roles to play. 5. The life cycle model, while useful for thinking about design, has problems that can be addressed by extensive user involvement and influence in design and by adaptations like prototyping. 6. There are a variety of ways to collect the information that you need for design. Interviews are the most popular method.
407
408
PART FOUR: SYSTEMS ANALYSIS AND DESIGN
7. Structured design techniques focus on top-down design. They employ data
flow diagrams and entity-relationship models to describe a system. It concentrates on data in the form of objects that communicate by passing messages. Objects, their attributes, and methods or procedures that act on the objects are encapsulated together. 9. The tasks of learning user requirements and determining the functions for a new system are the most difficult part of design, regardless of whether you use structured or object-oriented approaches to describe the system.
8. Object-oriented design is the newest approach.
IMPLICATIONS FOR MANAGEMENT
I am constantly surprised and encouraged by the inventive applications people dis cover for technology. You can easily find an outlet for your creativity in designing information systems. There are standard kinds of transactions processing systems in most organizations, but even within a routine application like order entry, there are a variety of ways to execute the design. For a multiuser system, you will want to appoint a design team and be sure there are reviews of the system with manage ment and other users. You may also have to act as the chief sponsor for a system you would like to see developed. It is important to remember that professional de signers disappear into the sunset after completing a project, and users have to live with the application every day. KEY WORDS
Champion Class Conversion Data flow diagram (DFD) Design Encapsulation Enhancements Feasibility study Inheritance Maintenance Object interaction diagrams Object-oriented analysis Object-oriented design Object structure diagrams Objects Operations Polymorphism Preliminary survey Prototype Structured design Systems analysis Systems life cycle
CHAPTER 15: BUILDING SYSTEMS: CREATIVITY WITH TECHNOLOGY
Testing Top-down design Training Transactions sequence diagrams RECOMMENDED READING Boehm; B.; A. Egyed; J. Kwan; D. Port; A. Shah; and R. Madachy. "Using the WinWin Spiral Model: A Case Study," Computer. July 1998, pp. 33-44. De Marco, T. Structured Analysis and System Specif ication. Englewood Cliffs, NJ: Prentice Hall, 1979. (An excellent book on structured design.) Rumbaugh, J.; M. Blaha; W. Premerlani; F. Eddy; and W. Lorensen. Object-Oriented Modeling and Design. Englewood Cliffs, NJ: Prentice-Hall, 1 99 1 . (A detailed introduc tion to object-oriented design.) Schneiderman, B., Designing the User Inteiface, 3rd ed. Reading MA: Addison Wesley, 1998. (The classic book on interfaces.) Yourdon, E.; K. Whitehead; J. Thomann; K. Oppel; and P. Nevermann, Mainstream Objects: An Analysis and Design Approach for Business. Upper Saddle River, NJ: Prentice-Hall, 1 995. (A book developed by Software A.G., a major database and lan guage vendor, on how to develop object-oriented systems.)
DISCUSSION QUESTIONS 1 . What are the advantages of user-oriented design? 2. What are the disadvantages for the IS staff and users of user-oriented design? 3. Would you expect user-oriented design to be more or less costly than conventional
approaches? 4. What is the role of top management in building systems? 5. What type of planning for applications should be undertaken by the IS department? 6. Does a long-range IS department plan make any sense when technology is rapidly
changing? 7. How should new systems development projects be charged in the organization? Should
overhead, the IS department, or user department budgets absorb the cost? 8. Why have so many existing systems concentrated on information flows and transac
tions processing rather than decisions? What kinds of applications exist today that go beyond transactions flows? 9. What are the pros and cons of central systems development versus applications devel opment at each company location? 10. What does a user need to know to contribute to the design of a multiuser system? 11. Develop a questionnaire for obtaining data from potential users of a system on their at titudes, expectations, and thoughts for the goals of a new system. 12. The design of information systems is best accomplished by a team. What possible con flicts might this create for other employees? How should the team structure be pre sented to reduce these problems? 13. If users design systems, will changes still be necessary after conversion when the sys tem is in operation? Should as many changes be needed as under conventional design? Why or why not? 14. How can users be sufficiently involved in systems analysis and design in a large orga nization when there are many potential users who should be included?
409
410
PART FOUR: SYSTEMS ANALYS I S AND DESIGN
15. Can top
managers participate in systems analysis and design if they will also be users? contribute to systems development? 17. How should the IS department's budget be divided between new applications and enhancements to existing systems? 18. Are there decisions in the operation of existing systems that users should influence? 19. What is the purpose of structured design methodologies? 20. To what extent can personnel resources be reallocated within the IS department to provide more flexibility in meeting demands for service? 21. What are the major characteristics of object-oriented design? 22. Why do many IS staff members resist making changes requested in operational systems? 23. When on a cost-cutting drive, management will sometimes dictate an across-the-board budget reduction of some number, say 10 percent. Does this approach make sense for the IS department? What alternatives are available? 24. What is the most likely reason a proposed system will be infeasible? 25. How do changes in technology, especially advances in hardware, affect the feasibility of new applications of technology? 26. Where are the largest bottlenecks in the systems life cycle? That is, where are the most problems and delays probably encountered in developing a system? 27. Compare and contrast structured and object-oriented approaches to design. 28. Is there one design approach that is best in all situations? 29. What design approach would you choose for a system to process incoming orders for a manufacturing firm? 30. What design approach would you recommend for an interactive decision support sys tem to be used by the treasurer of a firm to manage cash deposits? 31. What are the differences in design for a multiuser system versus a personal system on a PC? 16. How can management best
CHAPTER 1 5 PROJECTS
A Group Design Project Please note that this assignment is to be completed in a group; it is very hard to do systems analysis and design alone, particularly if it is the first time you have worked on such a project. An important part of this exercise is learning to work with people on a design team who will have different ideas than yours. In order to make the assignment a little bit more fun and to create some diver sity, your first task is to choose your company and products. The firm you are "de signing" manufactures and distributes a product (of your choosing). The company has its headquarters at its one manufacturing plant in Hoboken, NJ. There are three warehouses that handle regional distribution throughout the East Coast. (There is some business from other locations, but the firm's major market extends west from Boston to Cleveland and south to Washington, D.C.) Your company obtains sales from three sources: 1. Fifteen sales representatives who call on customers: 45 percent of the orders come from this source.
CHAPTER 1 5: BUILDING SYSTEMS: CREATIVITY WITH TECHNOLOGY
2. Three 800 toll-free numbers that customers call directly to place an order: 40 percent of the orders come to the phone desk. 3. Mail: 15 percent of orders come by mail. There are a number of problems with the way orders are now processed in your firm. First, there are no computers and there is no automation. All orders must be written on a standard order form for processing. Sales representatives mail most orders to headquarters and call in urgent orders. Communications with the warehouses are disorganized. Two or three times a day copies of orders are faxed to the warehouses for picking. The order department phones in emergency orders. Because of all the problems in order processing, about 25 percent of the day's orders are urgent enough to be phoned to the warehouse. As a result, the warehouse staff picking orders is not scheduled efficiently. Second, as the executive vice president said, "We are drowning in paper. Our current system was fine when we were a small company, but our volume has grown 50 percent a year for the last three years. I suspect we are losing orders; I know that our delivery time is terrible. Some customers have told us they are going to our competitors because, while our product is superior, we can't get it to them." Third, your firm does not have the ability to learn anything from its orders. Be cause they are all on paper and it takes so much effort just to get the goods out, no one can look at the information the orders contain. You don't know what percent age of sales each source of orders represents; management wonders if it pays to have a direct sales force, but can't get the data to decide. All forecasting for pro duction is done by looking at what was manufactured the previous year; there is no updating from current orders. Your assignment is to design a new system for order processing for your com pany. The president feels it is important to accept all types of orders, including those by phone, fax, mail, and from the Internet. Your report should contain the logical design for a new system. Please design an order entry screen for telephone orders and a Web page(s) for direct order entry via the Internet. You are not required to recommend hardware, but you should give some thought to hardware and software architecture. For example, are you designing a system for an airline reservations system mainframe computer or for a pocket Sharp Wizard?
Defi ning a System for Simon Marsha l l In a previous chapter you were asked to develop a simple portfolio system for Simon Marshall Associates. The system you developed was based on a personal computer and used a database management package. Because the problem was rel atively well specified, there really was no systems design. Now, take the problem you completed and think about turning it into a working system for Simon Marshall. First, identify the objectives of a system and its poten tial users. Then, think about features that might be necessary for different individ uals who might work with the system. Is there a need for more data than in the original problem? What kind of output will users want to have, both on the screen and in printed form?
41 1
CHAPTER
16
Outline Systems Analysis Survey and Feasibility Study Costs and Benefits of New Systems Identifying Systems Alternatives Organizational Impact Technological Feasibility Contents and Format for a Study
Determining Feasibility Selection Committee
Selecting an Alternative Undertaking Systems Analysis Undertaking Systems Design Results of the Design Process
General Design Considerations Client-Server Design Graphical User Interfaces Designing Web Sites The Input Bottleneck Handling Errors Backup
41 2
CHAPTER
1 6:
BUILDING SYSTEMS: FURTHER DEVELOPMENTS
Computer-Aided Software Engineering Upper CASE Lower CASE Is Rapid Application Development a Solution?
What Is Conversion Effectiveness?
Focus on Change
We often seem to forget that the purpose of designing a system is to change some thing, the flow of information, the processing of transactions, the way people do their jobs in the organization, and so on. One of the reasons changes are so diffi cult is that we are dealing with abstract concepts and often invisible procedures. It is also often the case that applications with the greatest chance of transforming the firm are the most risky and the least likely to demonstrate a clear cost savings in advance. The manager has to decide whether to undertake these risky, potentially high-payoff applications. •
In this chapter, we examine the early stages of the systems life cycle, the place where users have the most to contribute. The two appendices to this chapter contain examples of structural and object-oriented design. To some extent, the old saying, "You can pay now or you can pay later," applies here. Organizations that spend time in the beginning of a development process carefully defining their requirements for the system have a much better chance of success than organizations that begin to write programs with an inadequate definition of what the system is to do. The anal ogy of constructing a building applies. It is very easy to move walls and other com ponents of a building when looking at the architect's drawings. Once the building has been constructed, moving walls gets to be expensive, and you may not even have the option of making a change because of the way the building was constructed. We begin the development process with a preliminary survey and the feasibility study. The output from these two studies is used to determine whether to proceed with the design of an information system and to select a single processing alterna tive if the system is approved. If a system is feasible, the analysis and design stages are undertaken, and the design team prepares detailed specifications. SYSTEMS ANALYSIS
Analysis is the study of a problem, generally done before undertaking some action to solve the problem. In the case of systems analysis, the first task is understand ing and describing existing information processing procedures in the area of the proposed new system. Many of the techniques recommended in the previous chap ter can be used to document our understanding of the present processing system, such as data flow diagrams. In many instances it will be hard to identify any organized set of procedures that represent the existing information processing system. We need to enumerate
41 3
41 4
PART FOUR: SYSTEMS ANALYSIS AND DESIGN
TABLE 1 6· 1
ANALYZING T H E EXISTING SYSTEM
Decisions Decision maker Input Output Frequency of decision Level of costs Information Flow Characteristics Form Source Retention Transactions and processing Operations By whom performed Peak load Average load Individualslfunctions Communications/coordination Communication among units, individuals
problems and determine what motivated the suggestion that technology might help in processing information. Whether there is a well-defined system or not, we should develop the specific information listed in Table 1 6- 1 . First, we should iden tify decisions that have to be made and the responsible decision maker. What are the inputs and outputs, what is the frequency of the decision, and what are the costs involved? Next, we should identify crucial information flows, including the source, fre quency, and volume of information. Information can be characterized according to the decision-making framework discussed in Chapter 3. For example, we can look at the form in which data are gathered and processed, either written or verbal. If documents are involved, how many are there and what is their information con tent? What types of decisions are supported? We also need to identify how information is processed as it flows through a sys tem. Who processes the information? What are the peak and average loads? A study should identify the critical communications between organizational subunits and individuals. We need to understand what role the system plays in coordinating work flows and other activities. Finally, we should estimate the current cost of in formation processing. As described in the last chapter, while structured design and object-oriented analysis are different, the kind of information above is needed regardless of which approach one takes to design, structural or object-oriented.
CHAPTER
1 6:
BUILDING SYSTEMS: FURTHER DEVELOPMENTS
H Probably the most perilous systems devel opment undertaking is a high-profile appli cation which serves the public. An airport, especially a new, expensive, and "high tech" airport, is a good place to get into trou ble. Hong Kong offers a $20 billion airport that fits this profile well. When Chek Lap Kok Airport opened, someone entered erro neous information into its main database. The corrupt data created monumental con fusion that one newspaper described as "al most comic," of course, unless you were there. Flights took off without luggage, offi cials resorted to tracking flights using pieces of plastic on a magnet board, and airport person n e l called each other on cellular phones to find out where passengers could find their planes. Hong Kong's systems cost over $70 mil lion U.S. and featured an array of different contractors. Seimens of Germany, VanDer Lande of Holland, and Swire Engineering from Hong Kong built a baggage system to handle 20,000 bags an hour. Honeywell de veloped a sophisticated building manage ment system that can assign jets to gates based on how cheaply an area can b e heated or cooled. All these systems link to an Oracle database that coo rdinates changes among systems. EDS built the air port display system. Someone entered incorrect data, and the display system did what it was designed to do: It broadcast the information as quickly as possible to all locations. With wrong gate or arrival time information, the airlines could not tell wh e re to send clean i n g crews, fuel trucks, baggage handlers, or passengers! There were tests of the system, one of which
involved 1 0,000 people, but still not every employee had a chance to use the system before opening day. It is not just the public that depends on airport systems; Hong Kong Air Cargo Ter minals, Ltd. is a freight forwarder linked to the airlines . A bug in the ai rport system caused com puters to e rase inventory records. Adding to lost data were problems with computer-controlled equipment at the airport. The result was to put the company out of business for several days, reducing the supply of fresh meat and produce i n Hong Kong. If Hong Kong's airport was not enough, the new airport in Kuala Lumpur, Malaysia, suffered al most the same fate. In Kuala Lumpur, 20 different contractors built sys tems for 20 different airport operations rang ing from baggage handling to flight informa tion. All the systems plug into 434 miles of fiber-optic cable. The system was designed so that there is manual backup if any com ponent fails. Unfortunately, on opening day for the airport, check-in agents typed wrong commands and then panicked when they were unable to generate boarding passes. They pressed a profusion of keys, overload ing the system . The end results: Agents wrote boarding passes by hand, and flights were delayed up to 2 hours. Here, stranded cargo sitting in tropical heat soon turned to rotting refuse. One can plan carefully and test exten sively, but very large systems serving the public can expect to encounter problems. The challenge is to minimize them, provide backup, and always be able to keep function ing until someone can resolve the problem.
41 5
41 6
PART FOUR: SYSTEMS ANALYSIS AND DESIGN
SURVEY AND FEASIBILITY STUDY
In this section, we present recommendations for the contents of the preliminary survey and feasibility study. Basically, each of these documents consists of two parts: the present system and an alternative. A feasibility study presents several potential alternatives and evaluates them on technical, economic, and operational criteria. We must estimate technical and operational feasibility and compare costs with benefits. Costs and Benefits of New Systems
Management usually insists on a costlbenefit justification for a system. You will generally find that the categories for benefits differ considerably, depending on the type of system planned. For example, it is likely that strategic systems will have more uncertain benefits and will be justified by improvements in customer service, new sources of revenues, and so on. The estimates of costs and benefits for trans actions processing systems are usually more certain and detailed. The firm might expect to reduce inventory balances by 25 percent, which results in a quantifiable savings in investment and handling. The tangible and concrete benefits for some systems, particularly strategic ap plications, are likely not to exceed their costs. Management may decide to develop the system anyway and the costlbenefit analysis helps assess the risks involved. In examining costs versus benefits, there are a large number of factors to con sider. System costs include the following: Development • • • • • •
Systems analyst time Programmer time User time Possible hardware purchase costs Possible software purchase costs Possible outside services costs (e.g., system integrators and consultants)
Operations • • • • •
Computer costs Communications costs Operating staff costs Incremental user costs Maintenance costs
Development costs are the actual cost of analysis, design, and installation for the system. These costs are highly sensitive to the amount of time necessary to de velop the system and are directly proportional to the number of analysts, program mers, and users, and the length of their involvement. Historically, professional es timates of the time required to design and install a system have been far too low. When assessing total costs, we should not forget the expenses of operating a new system. A new system may require the use of part of the time available on an
CHAPTER 1 6 : BUILDING SYSTEMS: FURTHER DEVELOPMENTS
existing computer, an upgrade on the present system, or a new computer or net work. Incremental staff in the IS department and users may be required to operate the system. Finally, there are the costs of routine maintenance and modifications. No system is ever finished; "bugs" will need to be eliminated, and users will re quest periodic enhancements as they work with a system. Traditionally, benefits are analyzed from the point of view of tangible cost sav ings from a system. Often these savings are measured by the reduction of workers currently employed or by an estimate of the number of future employees who must be hired without the system. (It should be noted that many times, savings projected in personnel prove illusory.) Tangible savings also come from more effi cient processing. For example, an inventory control system may reduce inventory balances while maintaining service levels. The firm saves the interest charges on the money previously required to finance the inventory level needed before the computer system was introduced. Today's great interest in business reengineering or business process redesign, discussed in Chapter 1 8 , involves management look ing for significant paybacks such as an order-of-magnitude reduction in costs. Tangible cost savings can be difficult to estimate in some cases. Emery ( 1974) has suggested looking at the value of perfect information as providing an upper bound on possible benefits. For example, in a forecasting application, what is the maximum benefit from having a perfect forecast of sales, that is, mowing in ad vance exact future sales? If the cost of developing the system exceeds the maxi mum benefit under perfect information, the application will undoubtedly be re jected immediately. If, however, the benefits appear higher than the costs, we can make various assumptions about the impact of less-than-perfect forecasts from the proposed system. To refine the benefits estimates, a prototype of the forecasting system could be applied using a simple computerized version of the forecast. The model could process historical data to provide an estimate of the improvements the model would produce over the existing forecasting procedures. Not only should we look at tangible cost savings, we must also consider intan gibles and unquantifiable savings. This is particularly true as we move from trans actions processing systems toward operational managerial control and strategic systems, where intangible benefits are more important. Some of the technologies that we discuss to support work groups in Chapter 2 1 are also hard to justify using the criteria of cost savings. We believe that technology can be used to increase revenue as well as reduce costs. Systems that give the firm a strategic advantage, such as a greater market share, are difficult to justify in advance on the basis of cost. The following list of benefits may prove helpful in this analysis (you may also want to review the dis cussion of the value likely to come from different types of IT investments in Chapter 3): • • •
Ability to obtain information previously unavailable Receipt of information on a more timely basis Improvements in operations
41 7
418
PART FOUR: SYSTEMS ANALYSIS AND DESIGN
• Ability to perform calculations not possible before (for example, the simulation of production schedules) • Reduction in clerical activity • Improvements in quality and accuracy • Improvements in decision making • Better communications and coordination in the firm • Improvements in customer service • Creation of ties with customers and suppliers • Reductions in cycle time • Contribution to corporate strategy • Improvements in competitiveness • Major redesign and improvements in business processes • A dramatic restructuring or redesign of the entire organization using IT design variables Chapter 3 discussed some of the ways technology can add value to the organiza tion. The categories above represent specific benefits that organizations have actu ally obtained from their investments in building new applications. Many organizations use subjective techniques to determine whether a project is desirable from a costlbenefit standpoint. They argue that with uncertain intangible benefits, one still has to decide whether a system appears justified. These decision makers use their SUbjective feelings of what a reasonable figure would be for the benefits provided by the system. Chapter 23 offers suggestions for how to decide on undertaking a new technology initiative. Identifying Systems Alternatives
General One of the major activities during the survey or feasibility study is to sketch possible alternatives for a new information processing system. Given the wide range of technology available, it is difficult not to be able to provide some assistance for a problem. The issue is not so much whether a system is feasible as what alternative is desirable. During a feasibility study, a design team should develop alternatives and crite ria for evaluating the alternatives. For a particular situation, a user may take the least expensive and most rapidly implementable system. In another case, a user may opt for a very comprehensive system to be custom programmed. The impor tant point is this: As a user, insist on seeing some alternatives ! Packages For many proposed systems, an applications package offers an alter native. Frequently, large amounts of money and time can be saved by using one of these packages, though there can be a number of drawbacks. An applications package is an over-the-counter program or system of programs purchased as an end product. The package vendor tries to make the product very general. Users supply the data parameters that apply to their situation, and the package does the processing. Since computer power is becoming cheaper per computation, it makes sense in many instances to acquire a package that may use computer
CHAPTER 1 6: BUILDING SYSTEMS: FURTHER DEVELOPMENTS
hardware inefficiently in order to have an application functioning earlier. We discuss packages extensively in the next chapter. Organizational Impact You should attempt to estimate the effect of each alternative system on the organiza tion. What departments and individuals will be affected by the system, and what jobs will it change? What will happen to any employees who are replaced by a system? Does the application create new links with customers and/or suppliers? Does technol ogy make it possible to restructure the organization or some part of it? Is part of the intent of this application to support the IT organization design variables presented in Chapter 4 to move toward a new structure, for example, the T-Form organization? Technological Feasibility
A proposed system may stretch the capabilities of modern technology, but may be the one that provides the firm with a great advantage. The design team needs to eval uate if a new system is technologically feasible. Burlington Northern railroad devel oped an extensive prototype of a train scheduling system in one region of the coun try to provide information on technological feasibility and to estimate costs and benefits if the system was installed across its entire service area. This systemwide decision involved a capital expenditure of more than $300 million. Prototyping and testing, however, are appropriate even when smaller investments are involved.
41 9
420
PART FOUR: SYSTEMS ANALYSIS AND DESIGN
. TABLE 1 6·2 OUTLINE OF PRELIMI NARY SURVEY AND FEASIBI LITY STUDY CONTENTS
Summary Goals Evaluation of each alternative The existing system Problems Goals of new system Decision considerations Information flow Processing Communications Each proposed alternative Overview-percentage of goals achieved and benefits Decisions I nformation flows Technical (database and processing logic) Development effort, schedule, and cost Operational aspects Impact on the organization Total costs and benefits
Contents and Format for a Study
The contents of one possible format for a survey or feasibility study are outlined in Table 16-2. The summary presents a brief overview of the reasons for the study and ranks each processing alternative, including the present system, on the criteria estab lished by a steering committee. This summary is the primary input for decision mak ing. Existing systems should be described according to the analysis above. Finally, the report presents each alternative in detail. Here it is helpful to include a scenario, that is, a reasonable projection of how the system will actually be used, including by management, users, and IS department activities, under each alternative. DETERMINING FEASIBILITY
At one time, the information services department usually decided what applica tions to undertake. As demands for service increased, problems began to develop because some user requests had to be denied. As more systems of importance to the organization developed, many IS departments felt they were placed in a diffi cult situation if forced to choose among competing applications. The IS depart ment is not in a position to decide whether a system is feasible or which process ing alternative should be chosen if a system is to be developed. Selection Committee
One answer to the problem of choosing information systems is to convene a se lection committee of users, other managers, and IS department personnel. When
CHAPTER
1 6:
BUILDING SYSTEMS: FURTHER DEVELOPMENTS
TABLE 1 6·3 SOME POTENTIAL CRITERIA FOR EVALUATING ALTERNATIVES IN PROJECT SELECTION
Contributions to strategy Tangible and intangible benefits User satisfaction Percentage of needs met Maximum potential of application Costs of development Costs of operations Timing of costs Timing of benefits Impact on existing operations Development time Time to implement Resources required Probability of success Probability of meeting estimates
representatives of various functional areas are included, each department is able to see why certain decisions are made. The selection of applications alternatives seems less arbitrary under these conditions. With management guidance, the committee can select applications and processing alternatives consistent with functions currently emphasized in the organization. SELECTING AN ALTERNATIVE
In this section, we assume that management has decided to undertake the develop ment of a technology initiative and that the task now is to choose an alternative for implementation. The organization is committed to investing in this project; the task is to decide how to develop the application, for example, through custom pro gramming, a package or outsourcing. For the purposes of discussion, we also assume that a selection committee exists to choose an alternative for implementation. The first task of the selection committee is to agree with the information services department on the number of alternatives for a single project and how the alternatives should be developed. As an example, suppose one user department has proposed an inventory control system. The alterna tives might include (1) doing nothing, (2) purchasing a packaged program from a vendor, and (3) building a custom system. Each of these alternatives for an inventory control system meets some percentage of user needs at different costs. Probably three to five alternatives for each proposed application are sufficient. However, there should always be more than one alternative for a new system. Selecting the first al ternative (doing nothing) is equivalent to deciding that a new system is infeasible. The next step is for the committee to agree on a set of criteria to be used by the information services department in evaluating each alternative. Table 1 6-3 contains
421
422
PART FOUR: SYSTEMS ANALYSIS AND DESIGN
examples of possible criteria, although the set of criteria will be unique for each or ganization. The set of criteria should be as complete as possible so that no impor tant evaluation factors will be overlooked. However, the selection committee should avoid enumerating too many criteria, or the data collection and processing require ments for evaluation will become a burden. Each criterion should be measured on a common scale of, say, I to 7. Once the criteria are determined, it is necessary to develop weights that indi cate the relative importance of each criterion in arriving at the applications selec tion decision. It is unlikely that all committee members will regard each criterion as equally important. Some method will have to be used to weight the criteria for different individuals. Approaches to this process range from simple rank-ordering schemes to partial and paired comparisons. The weights are of paramount impor tance to applications selection because they reflect the priorities of the selection committee. The committee, of course, cannot expect conditions to remain con stant. Shifts in management policies and users' needs necessitate revisions to weights over time. If the recommendations above are followed, the selection committee should be in a position to review a series of alternatives for the application. Each alternative should be evaluated on the criteria established by the committee. Consider the ex ample in Table 1 6-4. In this hypothetical decision problem, the selection commit tee is considering either an applications package or a custom-developed inventory system. The first column in the table lists the criteria agreed on by the committee and the information services department. The second column contains the weights as signed to each criterion by the committee. The remainder of the table contains the scores for each alternative as evaluated by the IS department. There are several ways to arrive at a decision given this information. One ap proach is to work toward a consensus among committee members. In this exam ple, the applications package would probably emerge as the preferred choice be cause of its high ratings on the important criteria of percentage of user needs met, development cost, and probability of success. As conditions change, the committee can modify the weights to reflect new pri orities. Also, criteria can be dropped and/or added to reflect new circumstances.
TABLE 1 6·4
APPLICATIONS SELECTION EXAMPLE
Criterion
Weight
Package
Custom·developed system
Percentage of user needs met Cost of development Cost of operations Staff to develop Probability of success
0.35 0.20 0.1 0 0.15 0.20
75% $42,000 $1 0,000 1 0.95
90% $90,000 $ 7,000 3 0.75
CHAPTER 1 6: BUILDING SYSTEMS: FURTHER DEVELOPMENTS
The major advantage of the recommended approach is that it forces an objective evaluation of several alternatives for each proposed application and provides a consistent but flexible framework for making decisions on applications. UNDERTAKING SYSTEMS ANALYSIS If a system is feasible and one alternative is chosen for development, the next stage is a detailed systems analysis. There are few guidelines on the depth of analysis required when the design team examines present information processing procedures. All aspects of the present processing method must be understood and documented, and the analysis should identify key decisions as well as flows of data. The design team must decide where to place the "boundary" on its studies. An expansive boundary may be appropriate, but a design team is well advised to take steps slowly in order to outline a manageable task. It is too easy to expand a sim ple processing problem into a huge system. What initially looks like an order-entry process turns into an accounts-receivable and production-control system, because eager designers expand the boundaries of the problem into other areas. The designers should document their understanding of present procedures with reports and memos . Data flow diagrams or object-oriented documentation should be constructed and reviewed with users who are not on the design team. When satisfied with its understanding of the present processing procedures, the design team should hold a "walk-through" with all users involved as a final check on the analysis. UNDERTAKING SYSTEMS DESIGN The most creative part of the systems life cycle is the design of new alternatives for processing. Although these ideas were sketched in the preliminary survey or feasibility study, the design team has to develop them in far more detail now. For example, in the previous section we chose a packaged program for inventory con trol (see Table 1 6-4). Suppose instead that we selected the custom-developed sys tem for development. The information in the feasibility study is general. The de tails of that system must be designed before programming can begin. What equipment is required? What are the screen formats, the database design, and the kind of queries and transactions to be processed? Results of the Design Process The results of this study should be complete specifications for the new system. An example of rough specifications can be found in Appendix A to this chapter. In structured design we usually begin by specifying the desired output. How does the user interact with the system? Then it is necessary to determine what input is re quired to produce this desired output. A comparison of input and output identifies the data that must be maintained in the database. Next, we consider processing. How are the input data transformed and used to modify the database? How often
423
424
PART FOUR: SYSTEMS ANALYSIS AND DESIGN
do data have to be updated? How are the input and the contents of the database processed to produce the desired output? Also, at this point the design team should specify manual procedures for other activities associated with the system. For object-oriented design, the process will be different; it follows the descrip tion and generates the design documents shown in the last chapter. In particular, the design team needs to identify familiar business objects associated with the ap plication. Examples of a business object are a customer, a supplier, an invoice, a product, or a service. You need to identify classes into which you can group the objects along with attributes that describe them. The actual processing of informa tion takes place through message passing so it is necessary to delineate the key messages that travel between objects. Transactions sequence diagrams or "use case" scenarios help describe the new system. GENERAL DESIGN CONSIDERATIONS Today's design environment is complex. While we would like the design to be independent of the underlying technology, that is really not possible. If you are
CHAPTER 1 6: BUILDING SYSTEMS: FURTHER DEVELOPMENTS
designing a new application for a client-server platform, the options available will be different than if you are developing a system that must include legacy ap plications on a mainframe. Client-Server Design The dominant architecture today is client-server. Design for this platform is com plex because there are so many components involved, including clients, servers, networks, user interfaces, and usually a database management system on the server. Object-oriented design approaches are popular in the client-server environ ment. The professional designer views this environment as consisting of four lay ers: the application, the server, the client, and the network. The application is what interests you as a user. The application uses the client's user interface to present information and the database on the server to extract and update information. Typically, about 75 percent of the program code will end up on the client for running the user interface. The professional designer is also con cerned with sizing the server. How much capacity will be needed to provide ser vice to all the clients that might simultaneously make requests of the server? Because so much of the processing takes place on the client, and the client gen erally sits on a user's desktop, client-server development is well-suited to exten sive user input in the design process. The user wants to select what appears on the client's screen to initiate data queries and display. Generally the client will run a windowed, graphical user interface (GUI) like Windows 98, and the application should look consistent with this overall interface. As an example, consider the client-server platform developed by a major invest ment bank for its brokers. This network features Sun Workstations and servers, all running Unix. The client part of the system provides the user with a number of win dows that contain real-time data from the stock and bond markets. The user can also display a client's portfolio in a window, and the sales assistant can access another window that runs the legacy mainframe systems that are necessary to update client information. There are multiple servers for this client-the Sun servers for market data and information, and the mainframe systems that act as servers for transactions processing information-which are important for the broker and sales assistant. Graphical User Interfaces The graphical user interface, as found in all windowing systems, has become the interface of choice for users. Virtually any system designed for modern hardware and software will feature a GUI. Designers are faced with a number of challenges in developing this kind of interface.
1. The interface must be simple and it must be easy to learn and remember for the infrequent user. The user should not have to go through a lengthy relearn ing process. 2. The interface should be fast and efficient for the frequent user and should not create awkward transitions or the need to move frequently from keyboard entry to the pointing device.
425
426
PART FOUR: SYSTEMS ANALYSIS AND DESIGN
There are a number of guidelines for developing this kind of interface: •
•
•
•
•
•
Try to make the screen look like a familiar physical object; for example, a calcu lator should look like a physical calculator. When the user clicks on a button, the result should mimic pressing the key of a real calculator. Try to make the interface consistent across all applications. It also helps to make the interface consistent with the windowing operating system interface and with popular applications that the user already knows how to use. Remember that the user is in charge of the windows and the interface should feel natural to the user. The mouse (or pointing device) is the primary mode for input, not the key board. The user will manipulate objects on the screen directly by clicking on them. Use modal tools, that is, tools the user can click on to change subsequent mouse actions. An example would be a drawing program where the user clicks on a line tool to draw a line or a circle tool to draw a circle with the mouse. The interface should be intuitive enough that, with the assistance of on-line help, the user does not have to revert to paper documentation about the application (most users will not open the documentation anyway).
The major objective of the designer is to create an interface that feels natural and intuitive to the user, a difficult task. Firms like Microsoft have usability laborato ries where subjects unfamiliar with software are observed trying to use it so de signers can learn what is intuitive. The same approach makes sense for developing custom applications. Create a prototype, and let users work with it before choos ing a final design. Designing Web Sites The rapid adoption of the Internet has led to a new industry for Web site design. Companies develop this capability in house or contract Web site design to any number of companies offering design and hosting services. (A Web site host runs a Web site for a client on its own host computer.) Developing a Web site is like any other design task: It is a human, creative endeavor. In Chapter 12 we saw exam ples of a number of Web designs. Which one do you think was best? What features made it more appealing than the others? There is no science of Web site design, but various experts offer guidelines. One place to look for ideas on designing Web sites is the Web itself. As of this writing, a helpful guide could be found at Yale's Center for Advanced Instructional Media (http://info.med.yale.edu/caimlmanual!contents.html). Web sites are graphic, so the suggestions above apply for good graphical user interfaces. A major characteristic of Web sites is the vast amount of content they may contain. Companies like IBM have thousands of pages of material on the Web; navigating and finding what you are looking for becomes a challenge and a major consideration in design. The Yale site describes four models for organizing information on a Web site for easy access, shown in Figure 1 6- 1 . The simplest scheme is sequential: one page leads to the next. This treatment might be appro-
CHAPTER 1 6: BUILDING SYSTEMS: FURTHER DEVELOPMENTS
FIGURE 1 6-1
Web site organization.
priate for a chronological presentation or a series of topics in which each page goes into further detail. A grid is appropriate when one wants to correlate two variables, such as a time line versus a series of standard categories. The pages in a grid should have a uniform structure of topics and subtopics, generally with no hierarchy of importance. One might organize medical records into a grid. Hierarchies are a popular way of organizing information; users are familiar with this representation and find it easy to navigate among the pages. A hierarchy models many different kinds of information, from the points on an outline to a family tree of products. The most free-form organization is a web in which one can reach a number of different pages from any location. Webs are good for small amounts of data and for experienced users. Large webs can be difficult to navigate and can easily confuse the user. There are many different guidelines for site design beyond the basic organiza tional structures suggested above. Most of the recommendations are based on a particular individual's tastes in design, often with feedback from user reactions to sites. S ome of thes e recommendations from IBM (http ://www.ibm. com/ ibm/hci/guidelines/design/affinity.html) are:
• Keep the site simple; do not confuse the user, but make it easy for him or her to find each function.
• Give users a lot of control over the interface; do not expect them to follow a given series of steps.
427
428
PART FOUR: SYSTEMS ANALYSIS AND DESIGN
• Try to provide a familiar interface; take advantage of what the user already knows about the subject to design pages that match his or her experience.
• Make objects and their controls obvious; try to use symbols and icons that the
• • • •
user will have no difficulty understanding. A good example is the trash can icon for deleting material. Make actions reversible; be sure that there is always a way to go back or undo an action so that users will be encouraged to explore the site. Make all actions accessible all the time; the user should not be prohibited from using a function just because he or she has chosen another one. Keep users out of trouble; the responsibility for protecting the user lies with the designer. Where feasible, allow users to customize the interface to make it more convenient for them to use.
There are many more guidelines like this. Given the large number of Web sites on the Internet, one viable design strategy is to find several sites that appeal to you and your users, and adopt them as a model for the design of a new site. The Input Bottleneck In the past few years, the trend in information systems has moved toward collect ing data as close to its source and as automatically as possible. The objective of this philosophy is to eliminate data transcription wherever feasible, thus avoiding errors and reducing the time required to enter the data into the computer. The ulti mate in automatic data collection, of course, is sensors attached to the input of a real-time system, such as the computer monitoring of a hospital patient. In most commercial computer systems, a popular source-data collection technique is to use a terminal and/or scanning technology. EDI also reduces the amount of input required for many business transactions. The Internet can often be used to get cus tomers to key information into your systems rather than having your own employ ees undertake this task. Bar coding is extremely popular. Parts in production, finished goods, pieces of merchandise, videotapes, and library books can all be tracked by using bar codes and their readers. There are also a number of firms that use hand-held terminals or PCs. United Parcel Service drivers use an electronic clipboard to record shipment data. Federal Express drivers use a hand-held device to read bar codes on pack ages, then upload this information to computers that track shipments. A number of pen-top personal computers are available, and we expect to see more direct entry by marking forms and printing information. Image processing involves scanning a document and either storing it on a mag netic disk or "burning" an image of it on an optical disk. This type of input and storage is well suited to documents that do not change. A large brokerage firm im ages stock certificates that customers send in for transfer to another name or other processing, as described in detail in Chapter 1 8 . The firm must keep a record of these certificates and should handle them as little as possible. By imaging the cer tificate and its accompanying documentation, various departments in the firm can
CHAPTER 1 6 : BUILDING SYSTEMS: FURTHER DEVELOPMENTS
retrieve all the necessary information about the certificate and the transaction from a terminal while the certificate remains safe in the vault. The image is represented as a series of dots (called pixels) and is not stored as characters as you would find in a word processing program. If you want a computer to process the data on an image, you must convert the thousands of pixels that represent each character to a standard character code like ASCII. Handling Errors A well-designed system handles errors; that is, it corrects the errors or notifies someone of them and continues producing valid output. It is not unusual to find more than half the instructions in a program devoted to error detection and han dling. Users on the design team should be aware of input-error possibilities and should design procedures to minimize their occurrence and any adverse effect on the organization. As an example, consider an order-entry application in which the sales force sends a completed order form to the factory. In the factory, clerks place a day's re ceipts of orders in a batch and add the number of pieces ordered to provide a total. Then an operator at a workstation enters the information from each order. First,
429
430
PART FOUR: SYSTEMS ANALYSIS AND DESIGN
the operator types in the customer number and the computer retrieves and displays the customer's name and address; the operator checks the computer-retrieved data against the order. If there is an error, the operator corrects the account number and continues. Each item on the order is keyed in, and the computer checks to see if the item numbers are legitimate. For example, is style 3245 made in blue? Various totals are computed on the order as a further check. For example, all the items en tered from the CRT can be added and the total compared with the total manually computed on the order. A listing of the day's orders with a batch total should cor respond to the manual batch total computed for the orders before they are entered into the system. If the company gave notebook computers to the sales force to prepare their or ders and then transmit them electronically, you would still need to perform error checks. Designers would create an editing program on the notebook computer to catch some errors at input and would look for others when accepting the elec tronic orders in the order entry system. What errors would you try to catch at each stage? Backup In addition to error controls during processing, we must consider the availability of backups. An audit trail is necessary; that is, there must be some way to trace transactions through a system from input to output. In an on-line system, one rea son for keeping a file of transactions is to make sure there is an audit trail. In fault tolerauce, the critical features of a computer are duplicated, both in hardware and software, so the failure of any part does not cause the computer to fail. Tandem (now a part of Compaq) and Stratus both make fault-tolerant comput ers. These machines have found a market for high-volume transactions processing applications such as those at the major stock exchanges. COMPUTER-AIDED SOFTWARE ENGINEERING You may have drawn the conclusion after reading this far that systems analysis and design is a very labor-intensive process. The people who bring automation to the organization have almost no automation to help in their work. Computer aided software engineering (CASE) is an attempt to automate as much of the de sign process as possible (see Figure 1 6-2). There are two areas where CASE has been applied, sometimes called "upper" and "lower" CASE. Upper CASE applies to the early stages of the design process, tasks like undertaking systems analysis and drawing data flow diagrams (DFDs). Lower CASE focuses on the later stages in the design cycle, such as automatically turning system specifications into working computer programs. The basic idea is that the power of PC-based workstations can be used to facilitate systems analysis and design. Today few examples of CASE tools are fully integrated, which means they offer all the features imaginable in such a tool and cover both upper and lower ends of the design cycle.
CHAPTER 1 6: BUILDING SYSTEMS: FURTHER DEVELOPMENTS
DFDs Data definitions Program modules Screen definitions Report definitions
FIGURE 1 6·2
A CASE approach.
Upper CASE There are a number of tools found in different CASE products to help in the early stages of analysis and design, including the following:
Diagramming tools. These tools, which help build DFDs, are the most frequent components of CASE products. Structured design has a variety of rules about how DFDs are to be constructed, and some of these products strictly enforce the rules.
Screen and report generators. These products can be used to quickly proto type a report by entering columns or fields on a screen. They are similar to the report-generating features of some PC database management systems (DBMSs). Sometimes they provide the ability to generate computer code to produce the report or input screen.
Repository. This is a huge database for storing everything about a system, in cluding database design, DFDs, and more. Lower CASE Lower CASE analysis and design tools include:
Code generators. These are programs that produce other programs based on specifications created earlier in the design process.
Code restructurers. There is much poor code in existence. These products take, for example, COBOL programs and convert them to structured programs to fa cilitate maintenance. More recently, CASE tools facilitate object-oriented analysis and design. Some times these features are added to an existing CASE system that is already based on
431
432
PART FOUR: SYSTEMS ANALYS I S AND DESIGN
structured design concepts. Since object-oriented design is often associated with client-server technology, some of the tools generate code for client-server plat forms. For example, one product generates PowerBuilder code, a client-server de velopment language from Sybase. We have seen the tremendous amount of manual labor involved in designing technology-based information systems. What will CASE do to design? Will it eliminate the designer? It is unlikely that designers will become obsolete. CASE tools aid the designer just as PC spreadsheet packages aided a large number of in dividuals who perform calculations on paper spreadsheets. CASE tools should make it easier to develop examples of screens and reports, and show them to users; feedback during development can come more quickly. To the extent that CASE tools reduce programming time and facilitate changes to a system, they should reduce the total time required for the systems life cycle. The task of developing programs in the future may require less skill. In fact, it is very likely that for a large number of systems, the analyst will be able to generate pro gram code using a CASE tool, bypassing the programmer altogether. The crucial bottleneck in developing new applications is systems analysis and design. Tools like CASE that support the designer will help to make building sys tems more productive. It is the lack of productivity, the lengthy time required to develop systems, and the budget overruns that make many users and managers dissatisfied with information services. Designers need to experiment with and adopt whatever tools help solve these problems. It is unlikely that you will use a CASE tool, but you may be involved in acquiring and implementing such a tool in your firm. Is Rapid Application Development a Solution? CASE is aimed at improving the systems development process; it has not been the panacea its developers originally promised. James Martin, however, has in corporated CASE into an approach he calls, "rapid application development," or RAD. The basic idea is to use powerful software tools and CASE to respond rap idly to users with prototype applications . The approach requires heavy involve ment of those who will use the system, often through a series of joint application design (JAD) workshops. Users and executives explain their needs to designers who use CASE and other tools to respond rapidly with a prototype solution. The user must respond in tum with feedback and modifications. The tools involved can include fourth generation languages, code generators, expert system shells, and of course, a CASE system to integrate all of the tools into one environment for the developers. There have been improvements in developing new systems over the years. However, no one has found a way to get the kind of productivity seen in the manu facture of electronic devices. Developing an application still involves considerable human labor, whether it involves a custom system, a package, an Intranet, or a desktop application. Techniques like rapid application development can help, but they have not resulted in orders of magnitude improvements in design as yet.
CHAPTER 1 6: BUILDING SYSTEMS: FURTHER DEVELOPMENTS
WHAT IS CONVERSION EFFECTIVENESS?
Conversion effectiveness (Weill 1 990) is defined as "the organization's success in converting IT into useful outputs." In his original study, Weill measured four com ponents of conversion effectiveness, including top management commitment, ex perience with IT, user satisfaction, and turbulence of the firm's political environ ment. While these items undoubtedly influence the conversion of the IT investment into a successful project, there are many more factors that influence success. My list includes the following, and you can probably add others:
• • • • • • • • • • • • • • • • • • • • • •
Size and scope of the project Amount of unknown technology involved Project management Support and encouragement of managers, and their sponsorship The urgency of the problem/opportunity addressed by the technology Norms in the organization User commitment and involvement Technical development environment Quality of the IT staff Strength of the project team Level of expertise of participants Type of technology employed Type of application Amount of custom code written Nature of packaged software included Use of external consultants Degree of understanding between users and developers Presence of a project champion Senior management involvement Amount of organizational change required Threat to existing personnel and vested interests User's views of the quality of the system
There are many variables that partially determine conversion effectiveness. A fail ure on any one of the items listed above can doom a project even if every other as
pect of development is successful. Estimates for the probability of successful conversion are the responsibility of IT staff members, consultants, outsourcing staff members, and other professionals with experience in the field. These individuals, given the nature of a proposed IT investment, should be able to estimate the probability of conversion success. They will base this estimate on their own past experience, the kind of technology the project requires, the capabilities of those working on the project, and other factors like those listed above that their experience suggests influence project success. For a manager, understanding that an IT investment does not automatically re sult in a successful outcome is very important. If you believe that organizations in general do not receive an adequate return from investing in technology, one reason
433
434
PART FOUR: SYSTEMS ANALYSIS AND DESIGN
a Fidelity I nvestment Co. had to close its Lon don office following a series of computer problems. I n one month the firm received more than 1 000 customer complaints about a faulty system that led to the late bookings of dividends and other problems. U.K. mar ket reg ulators , also swamped with com plaints, forced Fidel ity to stop taking any new customers or offering new services. They also fined the firm over $300,000 for failing to install a new computer system and train its employees. As a result of these problems, the unit lost $60 million in one year. The closing will affect 260 positions, but Fidelity will try to absorb the personnel elsewhere. Fidelity had 40,000 accounts in London.
We do not have enough information to know if Fidelity's problem arose from a sys tems design problem or not. However, this in cident shows the seriousness of system prob lems of any kind. For many companies, the technology is intertwined with basic operations and customer service. Management at Fidelity did not know or did not understand the seri ousness of its problems. Fidelity is not alone; Oxford, a U.S. health maintenance organiza tion, has been in serious financial difficulties due to inadequate management planning for technology. Systems analysis and design is a crucial part of understanding the way a busi ness works; after all, many organizations can be viewed as collections of systems. Ignoring IT can be a major management mistake!
may be their failure to successfully convert the investment into working applica tions. With a knowledge of the things that can go wrong, a capable manager may be able to increase the probability of a successful conversion. CHAPTER SUMMARY 1. Systems design is one of the most creative activities in modern organizations. Information technology offers the opportunity to radically reshape work processes and even the organization itself. 2. Unfortunately, design is a labor-intensive task that requires a great deal of te dious effort. 3. Remember that professional systems designers never use the systems they de sign. You use the systems that are designed by analysts, whether they work for your company or for an external consultant. Therefore, you should try to un derstand the objectives and functions of any new IT application that affects your responsibilities. 4. It is important to have more than one alternative to consider when making the decision to invest in a new application of technology. 5. We recommend the use of a selection committee to evaluate proposed alter natives for an IT investment. The committee should develop a series of crite ria for evaluating proposed alternatives and a procedure for making a choice.
CHAPTER 1 6: BUILDING SYSTEMS: FURTHER DEVELOPMENTS
6. Systems analysis involves understanding present processing procedures, whereas design involves creating new ways to apply technology to improve information processing. 7. Users are likely to be most heavily involved in the first part of the systems life cycle, in defining the system prior to actual programming. 8. The client-server is the most popular platform for design today; a design team must determine what tasks will be assigned to the client and to the server, and must develop the user interface for the client. 9. Today user interfaces are mostly graphical. The design of these GUIs requires great care and experimentation. 10. Web site design is one of the newest and most exciting areas for IT innovation. 11. The user needs to be concerned with reliability and backup for critical applications . 12. The concept of conversion effectiveness i s important in understanding some of the risks in developing new technology applications. Whether or not the firm receives a return on its IT investments depends heavily on its success in con verting an investment into a working application.
IMPLICATIONS FOR MANAGEMENT One of the worst-kept secrets in systems development is how labor intensive and time consuming the process is. Almost anyone who has worked on a development project will tell you that the project took more work and more time than antici pated. While there are CASE tools and structured approaches to design, no one has figured out how to automate the process of requirements definition-figuring out what the system is supposed to do. There is a saying that "The devil is in the details," which applies nicely to systems development. If you want technology to assist you in improving some business process, you have to identify exactly, in ex cruciating detail, the logical steps in the process. Even if you plan to purchase a package, you have to know what the system is supposed to do so you can see if the package meets your needs.
KEY WORDS Audit trail Client-server platform Computer-aided software engineering (CASE) Conversion effectiveness Fault tolerance Pointing device Selection committee Source-data collection Weight
435
436
PART FOUR: SYSTEMS ANALYSIS AND DESIGN
RECOMMENDED READING Deng, P.; and C. Fuhr. "Using an Object-Oriented Approach to the Development of a Rela tional Database Application System," Information and Management. 29, no. 2 (August 1995), pp. 1 07- 1 2 1 . (The basis for the example in Appendix B of this chapter.) Dewitz, S . Systems Analysis and Design and the Transition to Objects. Boston: Irwin McGraw-Hill, 1 996. (A systems analysis and design text that tries to bridge the gap between traditional design and object-oriented design.) Dos Santos, B. "Justifying Investments in New Information Technologies," JMIS, 7, no. 4 (Spring 199 1), pp. 7 1-90. (An interesting discussion of the future consequences of in vesting in IT today and a suggestion for how to compute the value of this option.) Weill, P. Do Computers Pay Off, Washington, D.C.: ICIT Press, 1990. Wu, S.; and M. Wu. Systems Analysis and Design. St. Paul, MN: West Publishing Co., 1994. (A straightforward book on systems development.)
DISCUSSION QUESTIONS 1. Why should you be interested in seeing a number of alternatives for a proposed IT
initiative? 2. What are the major sources of frustration in selecting applications? 3. What problems arise if the information services department is in charge of the design
and makes unilateral decisions? 4. Why collect data where they originate? 5. What is the concept of conversion effectiveness? Why is it important? 6. In your opinion, what kind of technology has the most pleasing user interface? 7. Can systems design be described as a science? What is scientific about it? What charac
teristics make it appear to be an art? 8. What are the major components of a client-server application? 9. What is the drawback for users in serving on a selection committee and/or a design team? 10. What other approaches to selection of information systems project alternatives can you
suggest? 11. What kinds of things can go wrong in developing an application? 12. Suggest a mechanism for deciding which enhancements to existing systems should be
undertaken. How does this problem differ from selecting new applications? How are the two decisions similar? 13. Why present multiple alternatives in preliminary surveys and feasibility studies? 14. How do projects already under way influence decisions on undertaking a proposed application? 15. How can you find out what applications packages might be available as a possible source of processing in a proposed system? 16. How should risk be considered in evaluating proposed alternatives? What are the risks in systems analysis and design? 17. What is an audit trail in an information system? Why is such a trail of transactions necessary? 18. What is the role of the server in a client-server system? The client? 19. How can you determine what size the server should be for an application? 20. Is it possible for technology to eliminate paper reports? 21. What contribution can the user make to a preliminary survey and feasibility study? How can the use of this information lead to biased recommendations?
CHAPTER 1 6: BUILDING SYSTEMS: FURTHER DEVELOPMENTS
22. Describe guidelines for designing a graphical user interface. 23. What other creative tasks are there in the organization in addition to the design of new
information systems? How do they differ from this activity? 24. What are the prospects for automating systems design tasks? Where could automation
be fruitfully applied in the systems life cycle? 25. Design a procedure for developing criteria and assigning them for selecting alternatives
for an application. 26. Does a system have to use the most modem technology to be successful? Why or why
not? Are there disadvantages to utilizing the most up-to-date technology? 27. How can a manager increase the probability of successful conversion of an
IT invest
ment into an application?
CHAPTER
16
PROJECT
Systems Design Pro b l e ms 1. One of the most common applications is payroll. Many organizations have custom-designed payroll systems, and many service bureaus offer packages to compute an organization's payroll. The logic of the payroll process is com mon across many organizations. Usually a file contains data about each individual who is on the payroll. An example of the data to be included in setting up this database for employ ees would be as follows: Name
Medical plan
Number of dependents
Pension
Marital status
Employee number
Deductions
Wage rate
Union dues
Social Security number
Hospital plan
On a periodic basis, such as weekly or monthly, input is necessary to trigger computation of the payroll and production of a check for each employee. At minimum, this weekly input would have to include the following: Employee number Regular hours worked Overtime hours worked Sick leave Special deductions
Once the system is run on a periodic basis, checks should be produced along with various accumulations for different year-to-date categories. The com puter program would subtract all deductions and withhold funds for tax pur poses. Also normally included in the output would be a payroll register. On an
437
438
PART FOUR: SYSTEMS ANALYSIS AND DESIGN
annual basis, the computer system would produce W2 forms and the sum maries of earnings and taxes withheld from wages for tax purposes. a. Design (i) the input screens to be used to place a new employee on the payroll file and (ii) the screens to be completed for each employee for a payroll. b. List the file contents and approximate field sizes for the payroll file. Do not forget to include year-to-date totals. c. Draw at least two levels of data flow diagrams for the payroll system. d. Describe the modifications necessary for the system to automatically wire a check to the employee's bank if the employee so elects and to include a notice to the employee. e. Design the file maintenance and change screens necessary to alter informa tion about employees. 2. Most organizations, whether manufacturing firms or service organizations, have some kind of accounts receivable. Accounts receivable was one of the first applications undertaken by many firms when computer systems were acquired. Service bureaus also offer accounts-receivable packages for sale or rent. Origi nally, most accounts-receivable packages were typically batch applications. Today we would expect to find on-line input and payment processing. Consider an on-line accounts-receivable system. An accounts-receivable transaction is generated by the shipment of a product to a customer. An opera tor at a PC enters the following information: Order number Shipment number For each shipment: Product code Quantity Date Shipping costs Special shipping mode Special discounts Comments
The program accepting this input responds with the customer's name and ad dress when the order number is entered. It also prints the product descriptions, the price extension, and the total invoice cost. The customer receives the statement and sends in payment for one or more invoices. The next task is for an operator to enter the payments and to match them against outstanding invoices. The operator enters the invoice number, the total payment, and exceptions to indicate partial payments for items on an invoice that are not paid. In addition to the printed invoices, invoice register, and monthly state ments, the system provides an accounts-receivable listing, a daily cash balance,
CHAPTER 1 6: BUILDING SYSTEMS: FURTHER DEVELOPMENTS
and exception reports for invoices that were partially paid or not paid at all. There would also be a function to allow inquiry concerning payment history. Of course, as with any system, it is necessary to establish new customers. The new customer information has to include the following: Account number Narne and address Credit payment terms Normal shipping mode a. Design the database, including customer, shipment, and invoice tables. b. Describe the overall flow of data for the system. c. Design the screens for data input and inquiry. d. List the edits and controls necessary in this system. 3. Sales reporting can be a very important application. Often, data for sales re ports come directly from shipping and/or invoicing systems in the organiza tion. At a minimum, this application requires a customer file including cus tomer number, geographic code, shipment date, order number, item number, quantity shipped, and price. From these data it is possible to generate an output sales report. This re port might be summarized by product, product type, region, or salesperson. a. Design an inquiry system for a client-server platform that would answer questions interactively concerning customers or products. Also design sev eral screens for users to access with browsers on an Intranet to retrieve sales data. b. Assume that historical data are available on sales for the past 1 0 years. What kind of forecasting system would you design for this organization? What would be your considerations in choosing a forecasting system? 4. The manufacturing or production function in an organization includes many activities, such as materials acquisition, production scheduling and control, work-in-process inventory control, and finished-goods inventory control. One way to start the manufacturing process is with the preparation of a bill of materials. A bill of materials lists all the components necessary to man ufacture a product. Usually the input that is provided is the number of new products identified by product number and quantity. The output from this sys tem is a list of subassemblies and the quantity required. That list contains all the parts needed to manufacture the particular product. a. Design the database for a bill-of-materials processor. b. Describe the logic of a program to display the number of parts needed given orders for products. c. Assume that the input to the bill-of-materials processor contains both the product and the shipment date. Design a system to produce a report on products that must be manufactured by a given due date. d. Design several screens for the company' s Intranet to provide production and inventory information throughout the firm.
439
440
PART FOUR: SYSTEMS ANALYS I S AND DESIGN
5. A budget is a fundamental managerial control tool in an organization. In set ting up budgets, minimal input includes an account number, the type of ac count, a description, and where a control break is to be taken to add up the to tals for each account. Then, for each budget cycle, input is provided on the account number, the budgeted amount of money, and the actual money spent. The output from such a system is the budget report. It shows the account, the description, the budgeted amount, the actual amount, variance amounts, and usually percentage totals as well. Design a database for a budget application, and describe the format of a budget report. Should the budget be available on an Intranet? 6. Technology is used extensively in the retail industry, particularly for super market checkout operations. In these systems, a scanner reads the universal product code (UPC) on items sold in the store. A midrange computer in the store contains a file with the UPC numbers and the current prices. As items are scanned, their prices are read from the file, and the entire cost of the gro cery order is computed. All during the day, the computer in the store maintains a record of items sold. In the evening, the data can be transferred to a central computer to up date master records, which represent sales and, more important, inventory bal ances. These inventory data can then be used to restock the supermarket so that it is not necessary for store personnel to place formal orders with the warehouse. Such systems were designed to speed the checkout process and to ensure more rapid response for the resupply of grocery products. a. Design the database for the local grocery store and the database for the central host computer. b. Develop a backup plan that will become operative if the computer in the supermarket fails. c. What reports could be generated from the system for use by store manage ment? What kind of queries will managers make?
APPENDIX A
This case study describes the design of a distributed system for Hardserve, a com pany that specializes in the wholesale distribution of merchandise to retail hard ware stores. Hardserve buys goods from manufacturers and stocks them in a ware house. Retail hardware stores order merchandise from Hardserve, which then ships it from inventory. Hardserve has usually been the first choice for retail stores trying to find an item, but if Hardserve does not have the goods requested by the retail store, the store will go elsewhere. The company's objective is to design a new system for its stores and the central warehouse. The case presents a prelimi nary survey and then sketches specifications for the Hardserve system. Goals We have identified the following goals for a system.
1. Reduce inventory levels while maintaining a desired level of customer service. 2. Reduce the reorder cycle time for the local stores: Get replenishment stock to local stores two days faster. 3. Improve management of seasonal and slow-moving items. 4. Capture sales data so purchasing can analyze trends and stock the proper merchandise. 5. Smooth the operations of the local stores by improving customer service and reducing paperwork.
441
442
PART FOUR: SYSTEMS ANALYSIS AND DESIGN
THE EXISTING SYSTEM Problems The existing system is illustrated in the flowchart of Figure A- I . At the present time we have manual processing of papers and an old inventory control package running on our warehouse computer. For some items we tend to overstock from fear of running out, and in others we miss a reorder point and incur a stockout. Purchasing hears from the warehouse when a particular item has reached a reorder point on the computer file. This reorder point is set by the warehouse manager's experience. We also have no real sales forecasting because we do not track which items are moving. Accounting analyzes the physical inventory, and at the end of the year, purchasing looks at what items have sold. By that time it's too late for the data to do any good. Decision Considerations We have identified the following crucial decisions in our business:
1. 2. 3. 4. 5.
What should be ordered for each new season? What should be reordered during the season and when? How much should be reordered each time? What items should be dropped from inventory? What and when should the local store reorder?
Information Flows Current information processing is shown in Figure A- I . The warehouse computer indicates when physical stock has dropped below the reorder point and sends a re port at the end of the day to purchasing. The purchasing agent either reorders the item, if it is not on order, or expedites it if an order has already been placed. At the end of the season, the purchasing department analyzes purchase orders and esti mates what will be needed for the next season. Decisions on the reorder amount are based on the purchasing agent's negotiations with the supplier. Approximate volumes of orders and other related data are given in Table A- I . A DISTRIBUTED SYSTEM Systems Design A local-store client PC, using bar coding and a wand for reading data into the computer, automates as much of the store's interaction with customers as possible and reduces store paperwork. The local-store PC places orders to a warehouse server through a communications link, dramatically reducing local-store inventory replenishment. At the warehouse, we streamline processing. With orders coming electronically, the warehouse system can consult inven tory records and prepare "picking lists" almost instantaneously. The system also uses an economic-order quantity to suggest reorders to purchasing. The
APPENDIX A: DESIGNING A DISTRIBUTED CLIENT-SERVER SYSTEM
FIGURE A·1
Flowchart of the existing system.
amounts of paper involved in placing a purchase order and in receiving the pur chased goods have been reduced. The rest of this discussion presents some preliminary design specifications for this system. For this design, to provide a little variety, we are using a modification of the data flow diagrams (DFDs) introduced in Chapter 1 5 . The rounded rectan gle for processing in the DFD is replaced with a circle to produce the "bubble charts" found in this example. Figure A-2 is labeled a level 0 diagram, though in structured design that desig nation officially belongs to something called the context diagram. Figure A-2 is a pseudo-context diagram since it has two "bubbles"--one for the store and one for the warehouse. In this example, using the two process symbols makes it clear that we are designing two systems that must interface closely with each other.
443
444
PART FOUR: SYSTEMS ANALYSIS AND DESIGN
TABLE A-1
APPROXIMATE MONTHLY VALUES
Average number of orders
January February March April May June July August September October November December
4, 1 00 6,700 7,800 8,400 5,400 4,600 5,000 5 , 1 00 6,200 9,500 1 0 , 1 00 8,200 8 1 , 1 00
Average orders per month: 6,758 Maximum orders per day: 500 Average orders per day: 31 1 Average number of items per order: 5 . 1
As the diagram shows, the hardware-store system includes a manager and sales, payables, and inventory clerks. In fact, these roles may actually all be played by one or two people. The sales clerk uses the system to check merchandise out at the "cash register," which is a personal computer with a bar-code scanner. The inven tory clerk uses the PC to scan the bar codes on new inventory items as they are re ceived from the Hardserve warehouse. The store system also accumulates a sum mary of payables for the payables clerk. Since the store purchases its goods from the warehouse, there is only one major payable. The store PC, then, keeps track of the inventory in the store. It subtracts sales at the cash register from inventory and adds the receipt of new items and customer returns to the inventory. The store system checks its files each day at the close of business to determine what items need to be reordered from the warehouse. It sends these reorders to the warehouse, as shown in Figure A-2. The warehouse system is very similar to the store system in that it maintains an inventory, too. The warehouse system interfaces to several systems. It sends a record to the existing Hardserve accounts-payable financial system, because the warehouse buys from a number of vendors and has a significant payables function. The warehouse system also includes the purchasing function, since the warehouse must purchase all of its supplies from different vendors. Finally, the warehouse system helps run the warehouse by creating picking slips for workers to use in fill ing the orders to be sent to the local hardware stores.
FIGURE A·2
Diagram O-pseudo-context diagram. (AP: accounts payable and AR: accounts receivable)
445
446
PART FOUR: SYSTEMS ANALYSI S AND DESIGN
System Specifications What kind of hardware is needed to support this system? The systems designer will generally seek advice from hardware and software experts in the organization building the system. For Hardserve, the general architecture is fairly simple. Each store will need a minimum of one PC and the warehouse will need a larger server to keep track of inventory. Systems Overview: The Local Store Figure A-3 shows the local-store system. The most important processes are sales ( 1 . 1 ) , inventory control ( 1 .3), and connecting to the warehouse ( 1 .4) . For FIGURE A·3
Diagram 1 -local-store system.
APPENDIX A: DESIGNING A DISTRIBUTED CLIENT-SERVER SYSTEM
the sales function, the design team is looking to various optical reading devices, such as wands, that read the universal product codes (UPCs) on merchandise. The designers have to survey the warehouse and check stores to see how many products have bar codes. If too few are coded, Hardserve might print codes and apply them as it receives merchandise to be placed in the warehouse. The inventory control process must keep an accurate "book" or file of the items in local-store inventory. As inventory is received from the warehouse, this process adds it to the store file: Store item prices and inventory. The same logic is followed if a customer returns merchandise to go into inventory. There may be in ventory adjustments. It is likely the store will take a physical inventory at least once a year and adjust the book inventory to conform to the physical. When there is a return transaction, the inventory process also should update the store sales file. As merchandise is received from the warehouse, the inventory control process updates open orders to reflect the receipt and posts data to the store payables file. The local store may wish to view various reports about its sales on a daily, monthly, and year-to-date basis. Designers will also have to consider the level of detail desired by store owners . For example, some users may want to see sales by product class while others want sales of individual products. The designers also have to determine if the reports need to show last year's sales to date as well. Process 1 .4 directs the store's PC to dial the warehouse so the local store can transmit reorders to the warehouse. This process consults the store item price and inventory file to determine what items have reached their reorder point; it then places an order for the item. Process 1 .4 posts each day's order to the open orders file so the merchandise can be checked off when it arrives. Sales Figure A-4 is a level 1 . 1 diagram for the sales process. During the day when cus tomers are in the store, the sales screen will probably be "up" most of the day. The user will scan purchases, the scanner converts the UPC to a product number, and the local-store computer looks up the price of the item in an item price file. The computer calculates any extension (the clerk can type a number to indicate multi ple purchases). If there is no UPC on the item, the clerk keys in the item number and the price and quantity. For example, it is unlikely that individual fasteners like nuts and bolts will have UPC numbers on them. The computer must reduce the inventory count in the store (process 1 . 1 . 1 ) by the amount of the sale, and post sales to the sales file (process 1 . 1 .5). After enter ing the last item, the computer calculates the sales tax and prints a receipt for the customer. The designers are also looking into the possibility of having the local store computer automatically dial a credit authorization number for customers who are using credit cards. The computer could then print the sales receipt to be signed by the customer for the credit card charge as well.
447
448
PART FOUR: SYSTEMS ANALYSIS AND DESIGN
FIGURE A-4
Diagram 1 . 1 -sales.
Inventory Control
Inventory control is one of the major functions of the system. Figure A-5 shows the next level of detail for inventory control. When merchandise is returned, the store sales file and the store item prices and inventory file must be updated. An in ventory adjustment transaction updates the latter file. Process 1 .3 . 1 shows what happens when inventory is received from the ware house. Three files are affected. The system displays a screen to be used in scan ning input items. The Hardserve warehouse prints shipment labels corresponding to orders so that the local store can scan items as they are received. The computer must update a file of store open orders and the store item prices and inventory file to reflect the receipt of goods. The user must enter any discrepancies between what was ordered and what was received (for example, the warehouse may only be able to send six of an item when the store ordered twelve). Finally, the process up dates the store payables file. The inventory receipt process is shown in another level of detail in Figure A-6. Similar DFDs are needed to provide additional detail on an inventory returns and adjustments.
APPENDIX A: DESIGNING A DISTRIBUTED CLIENT-SERVER SYSTEM
FIGURE A·S
Diagram 1 .3-inventory control.
FIGURE A·6
Diagram 1 .3.1 -inventory receipt.
449
450
PART FOUR: SYSTEMS ANALYSIS AND DESIGN
FIGURE A·7
Diagram 1 .4-connecting to the warehouse.
Although not shown on Figure A-6, the check-in procedure for receiving mer chandise will also probably require the ability to key in a receipt because the ware house may not be able to print scannable labels for each item received. Connecting to the Warehouse Figure A-7 shows the process for connecting to the warehouse. In this case, the ex ternal event of closing the store results in the connection. Process 1 .4.2 accepts price changes from the warehouse and updates prices in the store item prices and inventory file. Process 1 .4. 1 scans this file and sends the orders to the warehouse while updating the store open orders file. The process of transmitting orders is shown in more detail in Figure A-8 . Process 1 .4. 1 . 1 looks at inventory balances and reorder points and the reorder quantity in the store item prices and inventory file. If the quantity on hand for an item is less than the reorder point, the process generates a store order by posting the item to the store open orders file. Process 1 .4. 1 .2 reads the store open orders file and transmits the order created today to the warehouse.
APPENDIX A: DESIGNING A DISTRIBUTED CLIENT-SERVER SYSTEM
FIGURE A·a
Diagram 1 .4. 1 -sending store orders.
Inquiries Figure A-9 shows the logic for making inquiries. The user can display any field from the inventory record on the screen and inquire about prices and the quan tity of an item on hand. The user may want to inquire about items that are on order. The response to this query shows both on-hand and on-order quantities. Finally, the user can inquire about sales. (There is a sales reporting screen, but this query is intended for a short response for a few items rather than a compre hensive report.) Systems Overview: The Warehouse The warehouse system is very similar to the local store system. Figure A- l O (on page 453) contains a second-level diagram for this system. This diagram shows the major functions of the warehouse system including picking stock, sales reporting, inventory control connecting to the local stores, and purchasing goods.
451
452
PART FOUR: SYSTEMS ANALYSIS AND DESIGN
FIGURE A·9
Diagram 1 .5-inquiries.
Filling Orders An important role of the computer for the warehouse is to see that local-store or ders are filled and shipped the day after they are received. (During busy seasons sometimes an evening shift picks orders and the merchandise arrives at the store in the morning following data entry the night before.) As orders come in from the local stores, the warehouse server posts them in the order received to a warehouse file of local-store orders (Figure A- l l ). When the warehouse manager is ready for another batch of orders to be picked, the manager enters the number of orders he or she wants to generate. The system chooses that number of eligible orders from the picking file, and process 2. 1.2 checks each item ordered against the warehouse item price and inventory file. If the item is out of stock, the system prints a notice on the order-filling form. The system does not need a backorder capability because the local-store system will reorder again,
APPENDIX A: DESIGNING A DISTRIBUTED CLIENT-SERVER SYSTEM
FIGURE
A·1 0
Diagram 2-warehouse system.
since its quantity on hand will be below the reorder point if no merchandise is shipped from the warehouse to replenish the inventory. Process 2. 1 .2 reduces the inventory to reflect the planned shipment of the item and creates a filled-order form, which is sent to process 2. 1 .3. This process generates a picking list and sorts it into the sequence in which merchandise is
453
454
PART FOUR: SYSTEMS ANALYSI S AND DESIGN
FIGURE A·1 1
Diagram 2.1-warehouse picking.
stored in the warehouse. As a result, the stock picker does not have to retrace his or her steps, but can move down a row in the warehouse in one direction and fill the order. Process 2. 1 .4 updates warehouse sales while the order-filling process creates an accounts-receivable interface record. Sales to the local hardware stores represent a receivable account for the warehouse. Purchasing Figure A- 1 2 shows diagram 2.6 with more details concerning purchasing. Process 2.6. 1 is triggered by a purchase agent who wants to review inventory. The process scans the warehouse item prices and inventory file to determine items for reorder. The logic is similar to the processing of the store file. Instead of actually making the order, process 2.6.2 creates a suggested purchase order that is reviewed by the purchasing agent. Process 2.6.3 modifies the suggested order to create the final order that goes to a vendor. The purchasing agent may be able to take advantage of a special offer or have some other knowledge that the system lacks, so human re view is important.
APPENDIX A: DESIGNING A DISTRIBUTED CLI ENT-SERVER SYSTEM
FIGURE A·1 2
Diagram 2.6-purchasing.
Other Processes The remainder of the warehouse processing is quite similar to store processing and is not repeated here. The Database The data flow diagrams combined with a description of a database provide an im portant set of specifications for a system. Figure A- 1 3 is an entity-relationship (ER) diagram for the store system. In Figure A- 1 3 , the relationships appear on the lines connecting the entities. The arrows also indicate the nature of the relationship. A one-to-one relationship occurs when one entity is associated exactly with one other_ For example, one re ceipt causes one payable and there is one payable for each receipt, so the lines connecting these entities have one arrow_ There can also be l -to-m (many) relationships. One order contains many differ ent order items so the line connecting order to order item has a double arrow pointing to the order item and a single arrow pointing to the order. Finally, there are m-to-m, or many-to-many, relationships_ There can be many items on a sale and many sales of an item; double arrows point to each entity.
455
456
PART FOUR: SYSTEMS ANALYSIS AND DESIGN
FIGURE A·1 3
Entity-relationship diagram of store system.
Figure A- 14 (on page 457) is a rough-draft ER diagram of the warehouse sys tem. Here we use the convention of single and double arrows to represent 1 : 1 , 1 :n, etc. relationships. Can you refine this diagram until it resembles Figure A- 1 3 ? Table A-2 (on page 458) contains the preliminary contents of the data items for the files in the local-store system. At this point, no particular data structure or database model is specified. Later, as the design team refines the specifications,
APPENDIX A: DESIGNING A DISTRIBUTED CLIENT-SERVER SYSTEM
FIGURE A·1 4
First-draft entity-relationship diagram of warehouse system.
they will address the question of data models. If the team decides to use a pack aged database management system for a PC, they will have to adopt its structure for these files. Note that a number of the files imply repeating groups. For exam ple, an on-order file contains an order that is likely to contain a number of individ ual items. In Table A-2 we do not list repeating groups because that is a function of the data structure chosen. If we use a relational database, the order number might be repeated with each item number on the order.
457
458
PART FOUR: SYSTEMS ANALYSIS AND DESIGN
TABLE A·2
PRELIMINARY FILE CONTENTS
File
Field
Store sales
Item number Sales this year January
Size
Type
8
A
12
N
December Sales last year January
12
N
12
N
December
12
N
Item number Description Units Unit price Quantity on hand Reorder quantity Reorder point Store location
8 50 5 10 10 10 10 15
A A A N N N N A
Store open orders
Order number Order date Item number Quantity on order
8 6 8 10
A A A N
Store payables
Order number Order date Payable amount
8 6 12
A N N
Warehouse sales
Store number Item number Sales this year January
8 8
A A
12
N
December
12
N
Store item price and inventory
A
=
Alphanumeric field
N
=
Size
Type
Sales last year January
12
N
December
12
N
File
Field
Warehouse sales (cont.)
Warehouse item price and inventory
Item number Description Units Unit price Quantity on hand Reorder quantity Reorder pOint Warehouse location
8 50 5 10 10 10 10 15
A A A N N N N A
Warehouse file of store orders
Store number Order number Order date Item number Quantity on order
8 8 6 8 10
A A A A N
Warehouse vendor file
Item number Vendor number Vendor address 1 Vendor address 2 Vendor address 3 Vendor city·state Vendor zip code Vendor rating
8 8 30 30 30 30 10 30
A A A A A A A A
Warehouse on-order file
Order number Order date Item number Item cost Quantity on order Shipping instruct.
8 6 8 10 10 30
A A A N N A
N umeric field
Input and Output The design of the PC menu for the local store, input screens, query forms, and printed reports is left as an exercise for the reader. Summary In this case we have seen the results of a tremendous amount of work on the part of a Hardserve design team. They have developed a conceptual model of a client-server system that has two
APPENDIX A: DESIGNING A DISTRIBUTED CLIENT-SERVER SYSTEM
parts: the local store and the Hardserve warehouse. The team has specified the major functions that each system has to perform and the interfaces among the two systems. There is a preliminary database specification and ideas on the menus the user will see in the local store. There is more work to be done, but this would certainly be a good place to have an all-day review session with users to be sure they understand and approve of the major choices reflected in the de sign to date.
459
APPENDIX B
I
This
appendix presents an example of a systems design following the object oriented methodology described by Deng and Fuhr ( 1 995). The application is for a hypothetical hospital that the author describes as a medium-sized nonprofit or ganization. The hospital's objective is to provide high-quality health care while minimizing cost to patients . The hospital wants to replace its batch processing system with an on-line system that will handle tasks such as patient registration, billing, inquiries, the tracking of medical staff, laboratory results, and patient treatments. After a lengthy study, the hospital identified 1 0 basic functions for the hospital containing 22 total processes. A model resulting from this effort is shown in Figure B - 1 . OBJECTS AND CLASSES A key activity in object-oriented analysis is to identify objects and group them into classes, and then into superclasses. The designers fully define classes by in dicating their purpose, the tasks when called upon, and any collaboration with other objects to perform a task. Table B - 1 shows a list of candidate classes after the elimination of redundancies. Table B-2 shows related classes grouped into su perclasses. A class must have a purpose, that is, a definition of what it is as shown in Table B-3.
460
APPENDIX B: AN OBJECT-ORIENTED EXAMPLE
FIGURE
B·1
Enterprise model of the patient care administrative system.
E BlE
B·1
-------
CANDIDATE CLASSES AFTER ELIMI NATION OF REDUNDANT CLASSES
Patient Name Treatment Patient Bill Patient Service Expeeted Date Discharged Room Accommodations Patient SSN Main Menu Patient Information Display Room Utilization Display Phone (Contact Info.) Patient Home Phone Room Location
Physician Name Patient Record (Patient) Insurer Service Charge Date Discharged Patient Address (Contact Info.) Room Identification (Location) Physician Phone Ext. Patient Bill Display Services Display Patient Procedure (Treatment) Patient Charge
Room (Location) Physician Identification Patient Balance Date Admitted Physician Specialty Patient Identification Room Phone Ext. Third Party (Insurer) Patient Treat. Display Physician Info. Display Service Identification Patient Contact Info.
461
462
PART FOUR: SYSTEMS ANALYSIS AND DESIGN
TAB L E B·2
SUPERCLASSES IDENTIFIED DURING THE EXPLORATORY PHASE
Superclass
Classes
Superclass
Classes
Display
Main Menu Patient Information Patient Billing Patient Treatment Physician I nformation Service Information Room Information Room Phone Ext. Physician Phone Ext. Patient Home Phone Patient Charge Service Charge
Identification
Patient Identification Patient SSN Physician Identification Service Identification Location Identification
Name
Patient Name Physician Name Insurer Date Admitted Expected Discharge Date Discharge Date
Phone
Charge
Date
Remember that in object-oriented design, objects pass messages back and forth to initiate processing. The next step is to identify the role of each class and show the operations an object in the class must perform upon receipt of a message. Table B-4 shows the roles for each class. Then the designers iden tify interactions between classes or their collaborations. You might view this activity as defining the first part of a message by identifying the receiving ob ject without yet defining the detailed flow of control and data involved in a message. At this point, the designers develop detailed messages for each class. They doc ument this work with graphs of each class hierarchy, a graph of class interactions, and the messages supported by each class. It is also necessary to identify what in puts from other classes are needed for a given class to perform its tasks. Note how this design is similar to a client-server environment where one class (a client) re quests some kind of action from another class (server). This demand and supply relationship is shown in Table B-5 where numbers in parentheses indicate what the client requests from the server. As an example, the class Patient Name is required for the classes Patient Information Display, Patient Bill Display, Patient Treatment Display, Room Utilization Display, and Patient Bill. The Patient SSN will send a message to the Patient Name class.
APPENDIX B: AN OBJECT-ORIENTED EXAMPLE
B l E B-3 PURiPOSE OF EACH CLASS
Clas!1
Description and purpose of class
Patient Name Physician Name Treatment Patient Bill Insumr Patient Balance Patient Service Service Charge Date Admitted Expected Date Discharged Date Discharged Physician Specialty Room Accommodations Patient Identification Patient SSN Physician Identification Room Phone Ext. Main Menu Patient Treatment Display Physician Phone Ext. Room Utilization Display ServiGes Display Physician Information Display ServiGe Identification Patient Home Phone Patient Charge
First, Middle Initial, Last Name identifying patient First, Middle Initial, Last Name identifying physician Procedure physician performed on patient Patient charges for services rendered at the hospital Third-party agency for cost coverage Amount patient owes for a particular service Servicelitem a patient has received at the hospital Default amount that is charged a patient for a service Date patient was admitted into the hospital Expected date patient will leave the hospital Date patient was discharged or released to coroner Specialization or title of physician General/specific room characteristics Unique number identifying patient (SSN can change) Patient social security number Unique number identifying physician (SSN can change) Four-digit extension for rooms that have a phone Entry menu of patient care administration system Entry/query screen for patient treatment (from main/info) Four-digit extension for physicians who have a phone Entry/query screen for room information (from main/info) Entry/query screen for services information (from main menu) Entry/query screen for physician information (from main menu) Unique code identifying type of service Home phone number to reach patient/immediate family Amount patient charged for service (may be different from default service charged) Mailing address, city, state, and zip code of patient Unique room number identifying a particular room Entry/query screen for patient information (from main menu) Entry/query screen for patient billing (from main menu/info)
Patient Contact Information Room Location Patient Information Display Patient Bill Display
B l E B·4 ROLIES OF EACH CLASS
Class
Roles of class
Patient Name Physician Name Treatment Patient Bill I nsurE�r Patient Balance Patient Service
Identify patient Identify physician Provide medical/surgical care to patients Inform patient of charges incurred and balance due Identify agency for partial/full payment of patient bill Accept/display balance due for service rendered Accept/display service rendered Provide service/item to patient (continued)
463
464
PART FOUR: SYSTEMS ANALYSIS AND DESIGN
TABLE B-4-CONT I N U E D
Class
Roles of class
Service Charge
AccepVdisplay default service charge for service Display default charge when adding patient billing record AccepVdisplay date AccepVdisplay date AccepVdisplay date AccepVdisplay specialization Query doctors for particular specialization needed for a patient AccepVdisplay accommodations Provide specific options for patient care bedding AccepVdisplay/validate unique identification AccepVdisplay/validate unique SSN I nform third-party agencies of SSN for identification AccepVdisplay/validate unique identification AccepVdisplay phone extension Present user with choices Determine when and what user responded to AccepVdisplay phone extension Present user with choices: (add/ediVdelete/view/query/search/help) (treatmenVbilling/room) Determine when and what user responded to View/maintain patient information records Validate/update corresponding room information if patient assigned to a location Validate patient not assigned to multiple rooms or occupied rooms User choices: (add/ediVdelete/view/query/search/help) Determine when and what user responded to View/maintain patient billing records Return to main menu if selected from main menu Return to patient information if selected from there User choice: (add/ediVdeletelview/query/search/help) Determine when and what user responded to View/maintain patient treatment records Return to main menu if selected from main menu Return to patient information if selected from there User choices: (add/ediVdelete/view/query/search/help) Determine when and what user responded to View/maintain room information records Validate patient not assigned to multiple rooms Return to main menu if selected from main menu Return to patient information if selected from there User choices: (add/ediVdelete/view/query/search/help) Determine when and what user responded to View/maintain service information records User choices: (add/ediVdelete/view/query/search/help) Determine when and what user responded to View/maintain physician information records
Date Admitted Expected Date Discharged Date Discharged Physician Specialty Room Accommodations Patient Identification Patient SSN Physician Identification Room Phone Ext. Main Menu Physician Phone Ext. Patient Information Display
Patient Bill Display
Patient Treatment Display
Room Utilization Display
Service Display
Physician Info. Display
APPENDIX B: AN OBJECT-ORIENTED EXAMPLE
465
8LE 8·5 MESSAGE REQUEST AND PROVISION BETWEEN CLIENT AND SERVER OB.JECTS
ClaSl; (Client/Server)
Message
Patient Name Physiician Name Treatment Patient Bill Insurer Patient Balance Patient Service
1. 2. 3. 41 . 4. 5. 6. 7. 8. 9.
Service Charge
Date Admitted Expected Date Discharged Date Discharged Physiician Specialty
1 0. 11. 12. 1 3. 1 4.
Room Accommodations
Patient SSN
1 5. 1 6. 1 7. 1 8. 1 9.
Physician Identification
20. 21 .
Room Phone Ext. Main Menu
22. 23.
Physician Phone Ext. Patient Information Display
24. 35.
Patient Bill Display
36.
Patient Identification
Identify patient (35,36,37,38,41 ) Identify physician (40) Provide medical/surgical care to patients (37) I nform patient of charges incurred and balance due (36) Identify agency for partial/full payment of patient bill (35,41 ) Accept/display balance due for service rendered (36,41 ) Accept/display service rendered (36,39,41 ) Provide service/item to patient Accept/display default service charge for service (36,39) Display default charge in patient charge when adding patient billing record (36) Accept/display date (35) Accept/display date (35) Accept/display date (31 ,35) Accept/display specialization (40) Inform, through query, those doctors with a particular specialization needed by the patient (37) Accept/display accommodations (38) Provide specific options for patient care bedding Accept/display identification (1 ,3,5-7, 1 0-1 2,1 9,26,28,30,41 ) Validate that patient identification is unique (35) Accept/display SSN (1 ,4-7, 1 0- 1 2,41 ) Validate that patient SSN is unique I nform third-party agencies of SSN for identification (41 ) Accept/display identification Validate that physician identification is unique (37) Accept/display phone extension (38) Present user with choices Determine when and what user responded to Accept/display phone extension (40) Present user with choices: Determine when and what user responded to View/maintain patient information records Validate/update corresponding room information if patient is assigned to a location Validate patient not assigned to multiple rooms or occupied rooms (23,36,37,38) Present user with choices: Determine when and what user responded to View/maintain patient billing records Return to main menu if selected from main menu Return to patient information if selected from there (23,35) (continued)
466
PART FOUR: SYSTEMS ANALYSIS AND DESIGN
TAB LE B·5-CO NTINUED
Class (Client/Server)
Message
Patient Treatment Display
37.
Room Utilization Display
38.
Services Display
39.
Physician Info. Display
40.
Service Identification
25.
Patient Home Phone
26. 27. 28. 29. 30. 31 .
Patient Charge Patient Contact Info. Room Location
Present user with choices: Determine when and what user responded to View/maintain patient treatment records Return to main menu if selected from main menu Return to patient information if selected from there (23,35) Present user with choices: Determine when and what user responded to View/maintain room information records Validate patient not assigned to multiple rooms Return to main menu if selected from main menu Return to patient information if selected from there (23,35) Present user with choices: Determine when and what user responded to View/maintain service information records (23) Present user with choices: Determine when and what user responded to View/maintain physician information records (23) AccepVdisplay identification Validate that service identification is unique (41 ,8, 9,39) AccepVdisplay phone number (35) Reach patienVimmediate family if emergency AccepVdisplay charge (41 ,36) Display default service charge when adding record (36) AccepVdisplay contact information (41 ,35) AccepVdisplay room number (38) Validate that number is unique
Table B-6 contains the "signatures" for the patient care system. Message passing among clients objects and server objects is controlled by the signature. It specifies the type of parameters and objects that the class can receive and send. Creating Subsystems
A subsystem combines classes and superclasses into an efficient grouping for implementation purposes. The main menu structure is shown in Figure B-2; it has six choices or subsystems for patient care information. (Dotted lines show data flow relationships between two subsystems in the figure.) Figure B-3 (on page 468) shows the main menu screen. Physicians treat patients, so the treat ment subsystem is accessible through the physician subsystem. Similarly, pa tients receive service charges in the form of a bill, so the billing subsystem is accessible through the service and patient subsystems. (These two subsystems appear on a pull-down menu of the Patient command on the main menu bar in
APPENDIX B : AN OBJECT-ORIENTED EXAMPLE
467
BLE B·6
SIGltATURES OF EACH CLASS
Clasl;
Signatures
Class
Signatures
Patient Name Physiician Name Treatment Patient Bill Insuner Patient Balance Patient Service Service Charge Date Admitted Expected Date Discharged Date Discharged Physician Specialty
Get_PatientName(Text) GeCPhysicianName(Text) GeCTreatment(Text) PrintBiII(Text) returns (Boolean) GeUnsurer(Text) GeCPatientBalance(Currency) Get_PatientService(Text) GeCServiceCharge(Currency) Get_Admitted(Date) Get_ExpDischarge(Date)
Patient Treatment Display
Display_Treatment(Text) AddTreatmentRecord(Boolean) EditTreatmentRecord(Boolean) DeleteTreatmentRecord(Boolean) ViewTreatmentRecord(Boolean) QueryTreatmentRecord(Boolean) SearchTreamentRecord(Boolean) HelpTreatmentRecord(Boolean) Display-Room(Text) AddRoomRecord(Boolean) EditRoomRecord(Boolean) DeleteRoom Record(Boolean) ViewRoomRecord(Boolean) QueryRoomRecord(Boolean) SearchRoomRecord(Boolean) HelpRoomRecord(Boolean) Display-Service(Text) AddServiceRecord(Boolean) EditServiceRecord(Boolean) DeleteServiceRecord(Boolean) ViewServiceRecord(Boolean) QueryServiceRecord(Boolean) SearchServiceRecord(Boolean) HelpServiceRecord(Boolean) Display_Physicianlnfonmation (Text) Add Physician Record(Boolean) EditPhysicianRecord(Boolean) DeletePhysicianRecord(Boolean) ViewPhysicianRecord(Boolean) QueryPhysicianRecord(Boolean) SearchPhysicianRecord(Boolean) HelpPhysicianRecord(Boolean) GeCServiceld(Text) Validate_Serviceld(Text) returns (Boolean) Get_PatientPhone(lnteger) Get_PatientCharge(Currency) Display_ServiceCharge (Currency) Get_PatientContactl nfo(Text) Get_RoomNumber(lnteger) Validate_RoomNumber(lnteger) returns (Boolean)
Room Accommodations Patient Identification
Patient SSN
Physician Identification Room Phone Ext. Main Menu Physician Phone Ext. Patient Information Display
Patient Bill Display
Room Utilization Display
Get_Discharge(Date) GeCPhysicianSpecialty(Text) Query_Physician(Text) returns Physician Info. Display GeCRoomAccommodations(Text) Services Display Get Patient(lnteger) Validate_Patient(lnteger) returns (Boolean) GeCPatientSSN(lnteger) Validate_PatientSSN(lnteger) returns (Boolean) Get_Physicianld(lnteger) Validate_Physicianld(lnteger) returns (Boolean) GeCRoomPhone(lnteger) Display_MainForm(Text) GeCPhysicianPhone(lnteger) Display_Patient I nformation(Text) AddPatientRecord(Boolean) EditPatientRecord(Boolean) DeletePatientRecord(Boolean) ViewPatientRecord(Boolean) QueryPatientRecord(Boolean) SearchPatientRecord(Boolean) HelpPatientRecord(Boolean) Validate_RoomNumber(lnteger) returns (Boolean) Display_PatientBilling(Text) AddPatientBiIIRecord(Boolean) EditPatientBiIIRecord(Boolean) DeletePatientBiIiRecord(Boolean) ViewPatientBiIiRecord(Boolean) QueryPatientBiIIRecord(Boolean) SearchPatientBiIiRecord(Boolean) HelpPatientBiIIRecord(Boolean)
Physician Info. Display
Service Identification
Patient Home Phone Patient Charge Patient Contact Info. Room Location
468
PART FOUR: SYSTEMS ANALYSIS AND DESIGN
FIGURE B·2
Structure of the main menu.
FIGURE B·3
The main menu screen.
Figure B-3.) In Figure B-4 the structure of the patient subsystem that displays the information is shown on the right side of the figure. Figure B-5 is a sample screen from the patient subsystem. Other subsystems include one for the physician, which shows his or her special ization for patient treatment. The room subsystem shows room location within the hospital, phone extension, and the type of accommodations. The purpose of the service subsystem is to keep track of services performed by the hospital staff. The billing system shows each patient's original bill and the remaining balance. A treatment subsystem records services performed by physicians.
APPENDIX B : A N OBJECT-ORIENTED EXAMPLE
FIGURE 8-4
Structure of the patient subsystem.
-- �:':=======:;--.....J � C=�____________�
s....
1i'!J
2lo _
_ It_
-
- =';='.....J
E--'D� � -...
FIGURE 8-5
A sample screen of the patient subsystem.
Observations
Object-oriented design is an approach that uses objects, classes, and messages to model processes in the real world. Objects can be both clients and servers in per forming their roles. This approach to design is well suited to a client-server hard ware and software platform, an increasingly popular architecture.
469
CHAPTE R 1 7
1m
I 1m
I U
Outline For Whom Are These Approaches Intended? High-Level Design Tools General Packages Dedicated Packages Advantages of Packages Disadvantages of Packages Package Design A Classification Framework for Packages An Example of a Package Acquiring Packages Implementing Packages Conclusions
Prototyping How to Develop a Prototype An Example
A Range of Alternatives
Focus on Change
Applications that change the organization carry a lot of risk. Through nontradi tional techniques, the manager can reduce some of these development risks. Of 470
CHAPTER 1 7 : ENHANCING THE LIFE CYClE: PACKAGES AND OTHER NONTRADITIONAL TECHNIQUES
particular interest are techniques that reduce the time required to develop an appli cation. Opportunities to undertake a new strategy, adopt a new business model, or respond to a competitor require a fast response. Development cycles of years are inadequate in these situations; the organization needs a way to deploy new tech nology in time to make a difference. •
There are a number of problems with developing custom applications by follow ing the systems life cycle. First, a great deal of time usually elapses before the user comprehends all the features of a system. It is very difficult to understand specifica tions. Usually it takes a significant period of time to progress from specifications to the first tests seen by the user. If the user did not understand the specifications or did not conceptualize all the features of the system, it might be more than a year from the time the application is first discussed until its characteristics become known through test results. In addition, the development of custom systems is asso ciated with cost and budget overruns, particularly during the programming and test ing phases. Today, with high levels of competition and rapid competitive response as the norm, most managers want results in a matter of months, not years. In this chapter, we discuss a number of enhancements to the life cycle. The top ics in this chapter are discussed in independent sections; however, you should not conclude that they are in some way exclusive. It is quite likely that you will de velop a prototype using a high-level design tool. The prototype itself might turn out to provide a set of specifications for evaluating different packaged programs. All of these approaches are potentially interrelated and likely preferred to follow ing the traditional steps in the systems life cycle.
FOR WHOM ARE THESE APPROACHES INTENDED?
It is easy to read the material in this chapter and think that it is relevant only to an information services professional. Why might you take an interest in the topics discussed here? First, it is likely you will end up developing some of your own so lutions to information processing problems. Depending on the IS staff to meet all your processing needs often takes too long, and there are sometimes not enough IS staff members to answer all your requests. Throughout the text we stress that companies are moving toward client-server architectures. You and other managers will be the clients using PC-based worksta tions to access data located on servers. Who will write programs for the client to use once it accesses the data? You may be very fortunate to have someone in the organization to create these programs, but it is more probable that you will de velop your own programs using packages and high-level development tools. Second, as a manager and user of systems, you want systems development to proceed quickly and successfully. The approaches described here can help reduce uncertainty in development and can increase productivity. You may want to insist on seeing a prototype of a proposed system. In fact, you may want to develop that prototype yourself to illustrate your vision for a new system.
471
472
PART FOUR: SYSTEMS ANALYSIS AND DESIGN
Does anyone follow the systems life cycle? The systems life cycle has always illustrated the general approach designers take to developing systems. A working designer would not draw a lot of the distinctions in the life cycle but would think about the design while doing an analysis of the existing system. At some point, a team decides that a system was well-enough specified for programming to begin. The alternatives to a traditional approach of analysis, design, and programming discussed in this chapter alter or replace this series of steps. They are adopted to take advantage of advances in technology and to overcome some of the time and cost problems of the traditional life cycle. HIGH·LEVEL DESIGN TOOLS
The need to improve productivity in developing systems has led to the develop ment of new tools for building applications. The first of these languages appeared in the 1970s and became known as fourth·generation languages (4GLs) to con trast them with third-generation compiler-level languages like COBOL. These languages are often called nonprocedural because the programmer does not have to specify procedures in detail as with a third-generation language. Nonpro cedural languages have commands at a higher level than languages like COBOL or C. A nonprocedural language may simply interpret a series of commands en tered by the programmer and do what they indicate, such as sort records, summa rize them on a field, and print a report. One popular fourth-generation language is FOCUS. This language is able to create and manipulate databases. FOCUS is available on a variety of systems from PCs to mainframes. Its developer has created software routines so that it can serve as a central access point for data stored in a number of different database man· agement systems (DBMSs). These languages have evolved into high-level system building tools such as PowerBuilder, a product designed for the client-server envi ronment. Other higher-level design tools exist for developing applications for In tranets and the Internet. Users of these very high.level languages report impressive benefits. An elec tronics firm programmed a new order-entry system using the fourth-generation language NATURAL in less than half the time it predicted would be necessary had COBOL been used instead. In addition, users are pleased because working at a high level makes it easy to make changes to the system. Users feel that the pro grammers working on order entry are the most responsive group in information services because they respond so quickly to change requests. The major drawback associated with 4GLs is performance. Some firms found these languages are sufficiently less efficient than compiler-level languages so so as not to be useful in a heavy transactions processing environment. However, Morgan Stanley, a major investment bank, successfully rewrote its entire back office system using NATURAL for processing all its routine transactions. On balance, a fourth-generation language appears to be a good approach for increas ing responsiveness in development.
CHAPTER 1 7 : ENHANCING THE LIFE CYCLE: PACKAGES AND OTHER NONTRADITIONAL TECHNIQUES
A The Target store on the eastern edge of Phoenix sells prayer candles, but no child car rier bicycle trailers. The Target store 1 5 min utes away in the affluent town of Scottsdale sells trailers, but no portable heaters. Heaters are located in the store in Mesa, 20 minutes away. If all of this sounds confusing, it makes sense to Target, a 623-store discount chain owned by Dayton Hudson Corporation. Target is a master at "micromarketing," a high technology approach to customer ser vice. The idea is to tailor merchandise in each store to its customers. Target has ex perienced rapid growth following this strat egy. The average store has increased sales by 7 percent and Target has had an 1 1 per cent increase in operating profits. Buyers for the stores no longer believe that the best purchase is a large purchase. They may have to buy smaller quantities of tailored products. Buyers were convinced that they needed different merchandise in different stores as Target's sales of local
team logos reached $ 1 00 million in the early 1 990s. Some suppliers have to provide spe cialized products. Micromarketing requires a large invest ment in information technology and takes sophisticated systems to stock thousands of different items in each store. The process starts with a com puter-d riven p l a n n i n g process in which buyers create merchandise assortments to fit the racial, ethnic, and age features of different groups of customers. Planners match the merchandise to the community profile, and local store managers refine the model based on their knowledge of local tastes. Target feeds actual sales data into the system to generate sales and profit tallies for each square foot of space. These results are used to allocate space to different products. Information technology allows companies to deal with incredible levels of detail and complexity; it enables a store like Target to practice micromarketing.
GENERAL PACKAGES
We introduced packages in Chapter 14. In this chapter, we want to explore their use to speed development. There are a number of general packages in common use today, such as spreadsheets and database management systems, that offer an alter native for developing an application, especially for a small number of users work ing with PCs. Spreadsheet packages include the ability to record macros, a se quence of keystrokes which can be played back automatically. In addition to actually recording keyboard input and replaying it, elaborate macro languages exist for several spreadsheet packages. Microsoft has adopted a strategy of inter facing its office products to Visual Basic, a quite powerful programming language. Thus, from within an Excel spreadsheet, a user can execute macros written in Vi sual Basic. Because Visual Basic and other macro languages are so powerful, you can de velop extremely sophisticated applications using these general packages. One of my faculty colleagues uses an Excel spreadsheet to contain pictures of the students in his class and Excel macros to retrieve a picture and biographical information
473
474
PART FOUR: SYSTEMS ANALYSIS AND DESIGN
about each student. The disadvantage of these packages and their macro languages is that they are at a much lower level of detail than the commands typically used to build a spreadsheet. As a result, developing an application with these tools is a lot like programming, something that most users try to avoid. Another general package that makes a great development tool is a database management system. Vendors of packages like Access and Oracle designed them for a range of uses and users. You can develop a simple application work ing directly with relational tables, doing each operation and updating informa tion yourself. You can also use the languages with these packages to create input forms, update tables, and generate output automatically for a user who knows little or nothing about relational databases. The further you get into cus tom development, however, the more the tasks involved look like conventional programming. DEDICATED PACKAGES
A package is one solution to the problems of custom systems design. We usually think of packages as software, but an increasing number of vendors sell both soft ware and the hardware on which the software is run. Thus, a package can be thought of as a problem solution that is partially or completely ready to imple ment. The use of a package can dramatically reduce the time required to install a system by saving both design time and the effort devoted to programming. We can expect to spend far more than the cost of the package by the time it is in stalled, and it is unlikely that the package can be purchased one day and fully uti lized the next! It is important to realize that we are talking about dedicated packages in this section. The dedicated package is designed for a specific problem and is far less general than, say, a spreadsheet package. For example, a dedicated package for accounts receivable can be used for a variety of accounts-receivable opera tions, but that is all. It is useless for accounts payable or general ledger. With a dedicated package, you are buying much more of a custom solution to your problem; it is much less general and flexible than a package like a spreadsheet processor. Advantages of Packages
There are a number of advantages to packages: 1. A package should require less total development time, since detailed program ming specifications are not needed, and less programming than with a custom system. 2. In total, a package should result in lower costs, though it is not always clear that costs are lower by the time one learns how to use the package and makes modifications to it. 3. A package often has functions or extra features not found in a custom design.
CHAPTER 1 7 : ENHANCING THE LIFE CYCLE: PACKAGES AND OTHER NONTRADITIONAL TECHNIQUES
4. If the package has been used in other locations, many of the programs in cluded in the system have been debugged or at least run successfully in an operational environment. 5. From the standpoint of user understanding of a system, a package usually pro vides the opportunity to see in operation what one is purchasing before com mitting to its acquisition. Disadvantages of Packages
While there are a lot of advantages to packages, there are some counterarguments that raise questions about this approach: 1. A package may not include all the desired functions. 2. As a result, many packages have to be modified before they are acceptable to users. Modification is difficult; it requires changes to existing code and may
475
476
PART FOUR: SYSTEMS ANALYSIS AND DESIGN
be possible only through the vendor. Changing existing code can be expensive and is likely to introduce errors in the system. As with any programming en deavor, modifications also take time, reducing some of the benefits expected with a package from reduced development time. 3. To avoid making major changes in a package, you may elect to change proce dures in the organization. Such changes are not always easy to accomplish and can be disruptive to the firm. 4. You become critically dependent on vendor support for the software. If the vendor is not viable, you may be left with software and no way to support it, that is, to have errors corrected, receive new versions, training, and so forth. 5. The package may not run on the kind of computer you would like to have. The package may necessitate the purchase of hardware, and that system may not be compatible with your existing hardware or overall plan for information processing in the organization. Package Design
The vendor aims at producing a program that can be used in a large number of organizations. How can this generality be built into a system? There are four strategies: 1. The software includes a lot of input parameters or tables. For example, a man ufacturing package must have tables to fill in the capabilities of each work center. The input tables and parameters allow each user to tailor the system to the environment. 2. Different modules are provided for different situations. Assume that a com pany is selling a registration package for universities. There must be a module to handle grades. The vendor might have separate modules depending on the type of grades used-A through F, 100 to 0, and so on. It is unlikely that the same institution would use more than one grading scheme so the appropriate module is included for each customer. 3. The vendor may expect the organization to change its procedures to use the package. Often it is pointed out that a small procedural change in the firm is cheaper than the alternative of program changes. For packages that address very similar applications across companies or industries, the organization might seriously want to consider making some of these changes. 4. The vendor may plan for custom tailoring and modifications for each cus tomer. With this in mind, the package might be offered with a very flexible re port writer so the desired reporting formats of each customer can be devel oped when the package is installed.
Some combination or even all of these approaches may be followed for any given package. Whenever a package is to be installed, the more dedicated it is to a given application, the more input will be required by users to describe their orga nization and environment. Modifications may turn out to be the largest expense of the package, depend ing on how much programming is required. Some package vendors will not sell
CHAPTER 1 7: ENHANCING THE LIFE CYCLE: PACKAGES AND OTHER NONTRADITIONAL TECHNIQUES
their source code; only the machine language is provided. Under these circum stances, we are totally dependent on the vendor to make any needed modifica tions. Are modifications that run 20 to 50 percent of the cost of a package justi fied? In one situation, the manager of a warehouse could not fill orders with the procedures included in a package. The package had to be modified. Otherwise, he could not use a procedure followed for a number of years of allocating products to preferred customers while shipping only orders completely filled by available stock. Regardless of whether the vendor, an in-house programming staff, or some third party makes package modifications, there are precautions that should be taken to try to minimize future problems. One good strategy is confining modifica tions to certain modules. All changes should be carefully documented, with com ments on the modified programs and external documents detailing the changes. Most packages go through continual revisions and improvements. If changes are made and not noted, the organization will be unable to install new versions be cause the staff will not know what modifications to make to keep the new version compatible with custom changes in the prior version. A Classification Framework for Packages
The dedicated packages described above are generally easy to identify. They are devoted to solving a particular problem and cannot be generalized to another do main. A large variety of packages have been designed for different purposes and types of computers (see Figure 1 7-1). There is some debate as to what is a package and what is a language. We shall take a broad view and include several types of candidates for classification as a package. Packages are often developed for certain types of computers: large, midrange, or personal computers. Some experts refer to the first three categories listed below as "tools" because the user works with them to develop an application. These tools are used to develop an application in-house, as opposed to the previous alternative of a dedicated package. It is often the case,
FIGURE 1 7·1
Examples of packages.
477
478
PART FOUR: SYSTEMS ANALYSIS AND DESIGN
however, that the buyer has to modify a dedicated package, so it would be mis leading to suggest that the dedicated package involves no in-house development. High-Level Tools These languages and tools have statements that are at a con siderably higher level than a third-generation language. These packages are not dedicated to a particular application but instead require the user to apply them to a problem. Some of the languages are designed for specific problem areas such as financial modeling, but quite a few are basically general-purpose. Systems Software Software packages also exist that are designed for a specific purpose, such as a set of programs to provide database management or to control the interaction of a computer with terminals. These are systems software pack ages and can be quite general. DBMSs may follow the relational model, placing few limitations on the kinds of problems that these packages can solve. These pro grams may also be designed for just one computer or a small number of comput ers. Many would classify database management systems as systems software. Ven dors of these packages often provide sophisticated development languages to create packages that are a lot like fourth-generation languages. Problem-Oriented Languages Packages in this category are like higher-order languages in many respects but are aimed at a specific problem. SPSS (Statistical Package for the Social Sciences), which is used by nonprogrammers to analyze data, is an example of a problem-oriented language. An example of this package for Windows 98 is discussed in Chapter 9. Although a language, these statements are not difficult to learn, and many nonprofessional programmers use this package. The popular spreadsheet packages in this category include Excel and Lotus 1-2-3. These packages make it possible to construct elaborate models and test their sensi tivity to changes. Users reference cells in the spreadsheet through numbered rows and columns designated by capital letters. This ability to relate rows and columns using formulas gives spreadsheet programs their power. When data items are changed, the results for the entire spreadsheet are updated automatically. Spread sheets are the most popular tool for building decision support systems, a type of sys tem discussed in Chapter 2 1 . Dedicated Packages The last category i n Figure 1 7 - 1 contains dedicated packages, systems devoted to a particular application. This group is experienc ing explosive growth as more and more installations look at it first to buy before programming a custom system. This kind of package presents the greatest im plementation challenge. There are dedicated packages for running franchise restaurants and managing production. Other examples include general ledger, accounts payable, accounts receivable, bank demand-deposit accounting, bank trust management, supply chain management, and so on. These packages will most likely require modifications or changes in the buyer's procedures or both. They are not intended to be used as a language but are designed as an off-the-shelf substitute for a custom-designed and custom-programmed
CHAPTER 1 7: ENHANCING THE LIFE CYCLE: PACKAGES AND OTHER NONTRADITIONAL TECHNIQUES
We have emphasized the potential of tech nology to dramatically change the nature of jobs. Such changes often require extensive training and may even demand a new kind of employee. As the cost of technology drops and a variety of computing devices becomes available, new areas for applica tions appear. Investments in technology help make high-priced labor more productive. A good example of this kind of applica tion comes from the General Motors Ser vice Technology Group. This GM unit de veloped a service technician (no longer a mechanic ) system called "Smart Mentor," to make the technician more productive. It is being tested at three Cadil lac dealer ships. The technician wears a small com puter loaded with software to guide the technician through diagnosis and repair of a car. The technician carries the computer in a waist pouch and communicates with it t h r o u g h a headset. I n put takes p l ace through speech recognition, making the
system very easy to use. The technician hooks a portable monitor to the bumper or fender of a car. The technician talks to the computer, which displays text, animation, and video instructions for diagnosis and repair. In a typica l exchange, the techn ician might say that a certain car has an electrical charging problElm. The system displays a list of symptoms, and the technician indicates which ones the car exhibits. The computer diagnoses the problem, suggests tools, and displays a diagram of the area for repair. The system should help with the shortage of auto repair technicians and help them cope with the complexity of modern automobiles, especially their electrical and computer sys tems. GM had about 5000 pages of text in a 1 965 service manual for a car; they now have 1 20 , 000 pages and soon w i l l h i t 200,000. Storing and finding repair informa tion for the technician may be the Smart Mentor's biggest contribution.
system. The fundamental trade-off is to what extent you should (1) take the pack age as is, (2) pay to have the package changed, or (3) change company procedures. Enterprise software systems like SAP's Rl3 have also been discussed. These highly integrated software subsystems are the most extensive packages available. As discussed below, they are expensive, require a major installation effort, and are likely to change some of the basic operations of the firm that purchases them. Packages have been around for a number of years, but three factors account for the increasing interest in this option for developing a system: 1. The cost of programming is rising, as are the risks of not completing a project on time and within budget. In addition, specifications and features are often compromised in a custom design, so the user ends up not getting everything that was desired in the specifications. 2. The packages themselves are getting better because many have passed through several generations of improvements. 3. The declining cost of hardware means that we can afford to run a package that operates inefficiently on the computer in order to save development time and cost.
479
480
PART FOUR: SYSTEMS ANALYSIS AND DESIGN
FIGURE
1 7·2
The PeopleSoft home page.
An Example of a Package SAP is one of the most successful enterprise software packages to date. The company claims to have 15,000 customers for its various software products, in cluding 9 out of 10 Fortune 500 companies. It estimates that 200,000 people worldwide use one or more of its products, a very large number for a dedicated applications package. The full suite of SAP products includes subsystems for production, accounting, control, sales/billing/inventory, treasury and ad hoc reporting. The original SAP system ran on mainframe computers, but its newest product, Rl3, is designed for a client-server environment. The company also provides modules to facilitate elec tronic commerce using the Internet. One of the major selling points for SAP is the integrated nature of its applica tions. A change in one application updates the database and is instantly reflected in another program. For example, if the credit manager increases a customer's credit limit, you want that information available instantaneously in order processing so that you can accept more orders from that customer. All transactions update the financial accounting records including the general ledger, balance sheet, and P&L statement. As you might have guessed, implementing the full suite of Rl3 applications is not a trivial task. The cost of implementation can be several times the cost of the software itself. SAP encourages customers to "reengineer" their processes so that they can use Rl3 . They discourage changes in the system, though SAP has opened Rl3 to more customization compared to their earlier mainframe versions. It is safe to say today that what limits the spread of Rl3 is the number of consultants who can help a firm implement the package. All the major consulting firms have "SAP Practices" to sell implementation help to clients. There are literally thousands of decisions that managers must make to "parameterize" the package.
CHAPTER 1 7: ENHANCING THE LIFE CYCLE: PACKAGES AND OTHER NONTRADITIONAL TECHNIQUES
Despite the problems with implementation, SAP is an extremely successful package. The company is well on the way to establishing a software standard for processing the core transactions in an organization. Figure 17-2 is the home page for PeopleS oft, another ERP vendor. Acquiring Packages
Choosing a package is not an easy task. First, you have an information processing problem. If it looks as though the application is dedicated, you should perform a sys tems analysis and design study. The study should be carried through to a high-level design for a new system containing outputs, the contents of the database, and inputs. This design becomes a benchmark against which to evaluate various packages. In today's environment, you should not begin to look for hardware yet. Instead, it is time for research on possible packages. There are trade journals in the com puter field that rank packages, and certain proprietary information firms keep list ings of packages. Another good source of information is trade journals in the rele vant industry. Finally, for software for personal computers, one can visit various computer stores and look at their documentation on packages. Evaluation of a package is difficult. It is important for users and the information services staff to understand the package in detail. You should be sure to see the
481
482
PART FOUR: SYSTEMS ANALYSIS AND DESIGN
package work and ensure that users understand what it will and will not do. Then you should estimate the extent of modifications and determine whether the pack age will really work in your environment. Implementing Packages
Package implementation is not a trivial task. In certain respects it may be even more difficult than the development of a custom system. Refer to Figure 1 7-3, which shows a framework for package implementation. The environment of the organization, users' needs, and users' expectations about what the system should do all combine to create processing requirements. The package vendor offers a solution to these requirements. It is unlikely that the package will exactly match the customer's requirements, giving rise to discrepancies FIGURE
1 7·3
Package implementation.
CHAPTER 1 7 : ENHANCING THE LIFE CYCLE: PACKAGES AND OTHER NONTRADITIONAL TECHNIQUES
A FedEx uses technology extensively in its op eration; IT is key to its strategy of providing the best customer service in its industry. Every now and then, even a leader in tech nology has a bad day. One recent spring, Fed Ex implemented a package called the Optimizer, which schedules pilots to fly dif ferent routes. The package, developed by a company called Ad Opt I ndustries, Inc, is in use by Northwest, TWA, and UPS. It ap pears that the software worked as adver tised, but that the human input from FedEx led to some very difficult pilot schedules. Most airlines using such systems have very clearly defined work rules that govern the length and frequency of mandatory rest times between flights, the number of hours a day a pilot can fly, how long the pilot can be away from home, and similar conditions for scheduling. At Fed Ex these rules are not in a labor contract but are represented in more loosely written understandings. Lacking clear limits, the optimization program did what it was supposed to, it optimized the routes for efficiency.
Some of the resulting routes were effi cient but at a great cost to the pilots. One 727 pilot found himself starting early one morning flying from Memphis to Oklahoma City. From there, the Optimizer sent him to a hotel in St. Louis, which he reached on a passenger jet. Eight hours later, he was air borne for Chicago; it then returned him to St. Louis and then back to Memphis. All of this flying took place in 27 hours. An interna tional pilot found himself on a 1 2-day flight from Anchorage, Alaska, to Beijing to Mem phis to the United Kingdom to Japan and then back to Alaska. FedEx apologized to its pilots for its prob lems in implementing the Optimizer. How ever, the pilots, previously loyal to the com pany, thought management was trying to take advantage of a weak union. Anger at the scheduling program resulted in the com pany's 3500 pilots uniting behind the union and authorizing a strike vote just before FedEx's busiest period, the Christmas holi days. Buying a package does not always make implementation easier!
between the two. As an example, the customer may use eight-digit part numbers, whereas the package has provided for only six digits. During implementation, we must resolve these discrepancies, either through making changes in the organization or through special considerations in the implementation process. Finally, an imple mentation plan should be the result of the effort. The vendor can help in package modification by providing flexibility in the de sign of the system. Database management systems to support the package, good query languages, and report generators to custom-tailor the output are all useful. Thorough documentation is very important, as is consulting help during imple mentation. A number of vendors also offer telephone hot lines to answer calls from users who have problems. It may appear to users that they do not have to become involved since a devel oped package is being bought. In all likelihood, users will be more involved in the acquisition of a package, or at least more intensely involved over a shorter period of time, than with custom development. We must be sure that the requirements analysis is complete, that users in fact define processing requirements. The users
483
484
PART FOUR: SYSTEMS ANALYSIS AND DESIGN
also must understand in detail how the package works and think about it in terms of their present job environment. They must provide help in outlining the discrep ancies and in deciding how they are to be resolved through changes in the package or in company procedures. There have been just as many examples of package im plementation disasters as disasters with custom systems ! Conclusions
Packages are increasingly important in systems development. It is too costly to develop systems with custom programming if a package exists that will work for a given task. Most CIOs today prefer to find a package rather than develop a custom-programmed system. Remember to develop specifications on require ments at least at a high level before talking to a package vendor. It is very im portant to have a basis for comparing all the different packages and to avoid being swayed by features that one really does not need or want. PROTOTYPING
The objective of prototyping is to reduce the time needed to develop require ments for a system. The traditional design approach features an analyst who
CHAPTER 1 7: ENHANCING THE LIFE CYCLE: PACKAGES AND OTHER NONTRADITIONAL TECHNIQUES
spends time with users to elicit requirements. The analyst prepares specifica tions, which are given to the user to approve. Most users seem to have difficulty comprehending the specifications. As a result, it may not be until the testing stage that the user first gains an understanding of how the system will or will not work. A prototype is a model of a system that will eventually be developed. Its pur pose is to do the following: 1. Reduce the time before the user sees something concrete from the systems design effort 2. Provide rapid feedback from the user to the designer 3. Help delineate requirements with fewer errors 4. Enhance designer and user understanding of what systems should accomplish 5. Bring about meaningful user involvement in systems analysis and design
A prototype does not have to be real. For example, an architect's model of a build ing made from card stock is a representation of the building. Part of a system can be "dummied" using sample data, and output can be incomplete. The prototype may become a living specification that is constantly changed as the prototype is refined. In fact, the prototype may grow into the final system without even the de velopment of detailed specifications ! The external appearance of the prototype must be very clear. As an example, the prototype for a transactions processing system is likely to provide a fixed set of screens that accept input from the user, process it, and possibly return output. The full logic of the system has not yet been developed, so there will be restric tions. However, there should be enough of a system present that users can under stand how the final version will operate. How to Develop a Prototype
It is important that the prototype be developed quickly and that feedback occur in a timely manner. The actual development process is likely to be a sequence of ac tivities (see Figure 17-4). The designer meets with the user. The user describes the system. The designer builds a prototype. The user works with the prototype and critiques it. The designer modifies the prototype or starts again. 6. The process then returns to step 1 or 4.
1. 2. 3. 4. 5.
Changes here should be encouraged, not discouraged! We choose the prototyping approach because a set of system specifications is usually very abstract to the user. The prototype makes the system come alive. We want users to interact with the system and make it into what they would like to have. To accomplish the objective of rapid development, the designer will need to use one or more tools to develop the prototype.
485
486
PART FOUR: SYSTEMS ANALYSI S AND DESIGN
FIGURE 1 7·4
The prototyping process.
Software The designer can use any one of a variety of tools for developing a prototype, for example a high-level development tool (like PowerBuilder), a con ventional programming language enhanced to make developing graphical user in terfaces easier (like Visual Basic), or a database management system (like Mi crosoft's Access). These systems make the task of developing and modifying data structures much easier than is possible with most programming languages. High level programming languages and the ability to record your keystrokes and replay them (macros) make it possible to develop prototypes quickly. Effective programming and development tools are a requirement for prototyp ing. Remember that the prototype begins as a model. It does not have to include any of the editing and error-checking of a finished system. The purpose of the ex ercise is to show what can be accomplished, not to demonstrate that a system is complete.
CHAPTER 1 7 : ENHANCING THE LIFE CYCLE: PACKAGES AND OTHER NONTRADITIONAL TECHNIQUES
An Example
The firm that developed the following system offers services throughout the world. The firm was investigating a change in its ownership. It is owned by its employees, but new U.S. legislation made some alterations potentially attractive in ownership structure. The vice chairman of the board asked the manager of the information services department to develop a small system to project the financial position of the firm several years in the future if the new form of ownership was adopted. At first, the IS department manager simply wrote a small program in BASIC to model the plan. The output of the model formed one part of the recommendations made to the board of directors. After that meeting, at which the new plan was adopted, several managers noted the ability of the computer to forecast. One of them asked the IS department manager if it would be possible to forecast the bene fits an employee would have several years in the future. The industry is competitive, and firms frequently hire staff from each other. Be cause there are a variety of stock and benefit plans, it was difficult to show an em ployee the total value of remaining with the company. The information services staff began to work on this problem with help from different personnel and finan cial managers. Various formulas were programmed and the results checked by dif ferent groups until the rules were regarded as satisfactory. The manager of the IS department had a feeling that the system would grow so he had the staff develop it using database management software. The treasurer kept most of the data needed on benefits available to each individual, and he became very interested in the system. Computing bonuses took a long time and required heavy overtime. In general, records for each employee were scattered over several files, and reports were often inaccurate. The treasurer asked that the system be made capa ble of maintaining all employee records and benefit s. Because of the database ap proach and good development tools, it was fairly easy to meet his requirements. The system has evolved into a comprehensive personnel records and benefits application. This system succeeded because it was able to grow and change over time. As users saw new features, they developed ideas for extending the application. The primary user changed from the president, who had originally requested the projec tion system, to the treasurer. The application had high visibility, and senior man agement provided extensive input. The use of tools was also very important in the success of this effort. High-level languages, screen development aids, and a database management system made it possible for the system to evolve. In addition to intensive user involvement, the an alyst working on the application listened carefully and followed the logic defined by the users. She brought the results back to them, and the managers actually de bugged their own rules. By not trying to be in charge of everything, the analyst was able to develop a system with which users felt comfortable because they un derstood the details of how it worked. Not every system could be developed in this manner. In other circumstances, there might be a need for concrete specifications. However, the use of prototyping to show users what the system will do should be applicable across a wide range of settings.
487
488
PART FOUR: SYSTEMS ANALYSIS AND DESIGN
TABLE 1 7· 1
A COMPARISON OF DEVELOPMENT APPROACHES
Mainframe or midrange
Client-server
Package
x
x
Outsource
x
x
Environment
Desktop
Groupware (Chapter 21)
x
x
x
x
x
x
x
x
x
x
x
Internet/Intranet Buy
Make
Life cycle or spiral model
x
x
Fourth-generation language
x
x
Prototype/RAD*
x
x
User-developed (Chapter 20) *RAD: rapid application development.
Prototyping is a very effective way to improve the requirements definition phase for a system. The approach appears to be good for attracting users to the de sign process and obtaining their involvement and input. Done properly, it should result in systems that more closely fit user needs and that are completed more quickly with fewer operational changes required. A RANGE OF ALTERNATIVES
We have seen a variety of ways to develop new technology in the text. The ap proaches open to the manager are shown in Table 17-1. The firm may develop an application for a mainframe or midrange computer, a client-server environment, an Internet or Intranet, for a desktop user, or a groupware application (discussed in Chapter 21). The table divides approaches into "make" or "buy," with the buy op tion being a package or outsourcing. (Of course, in the "make" option, one might start with a package and modify it extensively.) The x's in the table illustrate likely choices. For example, one might use a fourth-generation language to develop a midrange or client-server application; you would probably not find a 4GL for groupware applications. Applications de veloped for Internets and Intranets are generally developed quickly and are un likely to follow a life cycle as such. A difficult task for managers and systems professionals is to determine the suitable development environment for a new ap plication of technology and then choose an approach. The nature and goals of the application are the primary determinants of which cell in Table 17-2 is chosen.
CHAPTER 1 7 : ENHANCING THE LIFE CYCLE: PACKAGES AND OTHER NONTRADITIONAL TECHNIQUES
'
TAB L E 1 7·2
COMPARISON OF THE ALTERNATIVES
Pros
Cons
Higher·level languages and tools
Very-high-Ievel statements, claims for high productivity, ease of use, speed of development and modification
Can be inefficient in processing OLTP applications, 13xpensive, proprietary, depend on single vendor
-------
------
Package program (general)
User often develops solutions
Can be a lot likE! programming
-------
------
Package programs (dedicated)
Avoid custom programming, faster implementation, debugged programs, more features than custom system
May have to change package or procedures
Prototyping
Users see immediate results, good for motivating involvement and feedback, reduce risk of misdesign
Time to develop, cost, may be seen as slowing progress
For example, an entirely new enterprise application today suggests the use of a package and external consulting help. An idea to make the specifications for your products available to customers seems a good fit for the Internet. It is important for managers to be aware of the options and participate in making decisions about development alternatives. CHAPTER SUMMARY
1. In many cases, management and the design team may adopt an alternative to custom development of a system following the traditional life cycle model of the last chapter. 2. The objective of alternative techniques is to reduce the time required to follow the systems life cycle and to provide early feedback to users. 3. Table 17-2 describes the pros and cons of the different alternatives and sug gests that advantages from these techniques do not come for free. 4. Higher-level languages and design tools make more efficient use of human time at the cost of some inefficiencies in execution. S. A general package program, like a spreadsheet, offers a number of tools for developing custom applications. These tools, when explored in detail, look a lot like conventional programming languages. 6. A dedicated package is designed to let the user eliminate custom programming. 7. The selection and implementation of a dedicated package is challenging. Often the organization or the package must change in order to work successfully.
489
490
PART FOUR: SYSTEMS ANALYSIS AND DESIGN
8. Prototyping is an excellent way to generate user input in the design process.
We recommend that, where feasible, the designer develop a prototype for dif ferent parts of any system under development. 9. The prototype may serve as a model and partial specifications for the final system, or it may evolve into the final system itself. 10. These techniques will improve the systems development process. However, they will not produce the order of magnitude improvement in development ef ficiency that the profession so badly needs. IMPLICATIONS FOR MANAGEMENT
Personal computers and their associated software packages make it relatively easy to prototype all or part of a system. A prototype is the best way to focus users on what a system will do. It is much more riveting than a set of specifications on paper. One of the real problems in design is a lack of communication between the designers and the users and managers specifying the system. A prototype helps users think about how they will do their jobs with the new system. If you are eval uating packages, you will also want to see the package at work in some other com pany to see if it is a good fit with your environment. A "picture" through a proto type or product demonstration is worth a lot of words. KEY WORDS
Database management system (DBMS) Dedicated package Discrepancies Expectations Fourth-generation language (4GL) High-level languages Implementation Macros Modules Nonprocedural Problem-oriented language Prototype Systems software RECOMMENDED READING Baskerville, R.; and J. Stage. "Controlling Prototype Development Through Risk Analy sis," MIS Quarterly. 20, no. 4, 1 996. (A helpful article describing the pros and cons of prototyping approaches to system design.) Harrison, M. Prototyping and Software Development. New York: Springer Verlag, 1998. (A good introduction to prototying techniques in software development.)
CHAPTER 1 7 : ENHANCING THE LIFE CYCLE: PACKAGES AND OTHER NONTRADITIONAL TECHNIQUES
KIeper, R.; and D. Bock. "Third and Fourth Generation Language Productivity," Com munications of the ACM. 38, no. 9 (September 1995), pp. 69-79. (An interesting study of productivity and language used in a number of projects at McDonnell Douglas; there appear to be productivity advantages for 4GLs.) Leach, R. Software Reuse: Methods, Models, and Costs. New York: McGraw-Hill, 1997. (A nontechnical guide to successful software reuse across the life cycle.) Montazemi, A.; Cameron, D.; and K. Gupta. "An Empirical Study of Factors Affecting Software Package Selection," Journal of Management of Information Systems. 1 3 no. 1 (Summer 1996), pp. 89-·106. (An interesting article that empirically tests factors influ encing software package selection.)
DISCUSSION QUESTIONS 1. What is the primary motivation behind the use of higher-level languages? 2. How does a query language such as the ones found in DBMSs reduce programming? 3. What are the advantages of using a PC DBMS in prototyping? 4. Should you be concerned if high-level tools use the computer inefficiently? Why or
why not? 5. Why are some very high-level languages called nonprocedural? 6. What are the advantages and disadvantages of using a spreadsheet package for applica
tions development? 7. How can it be faster for a user to write a program using a high-level tool than to have a
professional programmer prepare the report? 8. How is a dedicated package different from a general-purpose one? 9. Will the tools in this chapter eliminate the need for professional programmers? 10. How would you locate several dedicated applications packages for evaluation and
selection? 11. Is there still a place for writing custom programs in applications development? 12. Why has the progress in developing faster and cheaper hardware been so dramatic,
while productivity in systems development remains so low? 13. To what extent should users develop applications using tools like spreadsheets and
DBMSs? What are the pros and cons of this approach to development? 14. What are the special implementation problems of a dedicated package? 15. Under what conditions should an organization change its procedures to use a package? 16. Why are more companies looking first at dedicated packages rather than custom devel
opment for new applications? 17. How do packages reduce development time for a system? How can packages lower
costs? 18. What are all the costs associated with a package beyond the purchase price? 19. In buying a package, does one always get debugged programs? 20. Why should one insist on a demonstration of a package? 21. Why might a package not include some of the functions you want? 22. Why is a vendor reluctant to change a dedicated package for one customer? 23. Why is it important to control changes to a package carefully? 24. Why should you still develop a set of high-level specifications even if you are thinking
about acquiring a dedicated package for a new application? 25. Is a large organization likely to change procedures or change a package? Why might a
large firm have more need to modify a package than a smalll one?
491
492
PART FOUR: SYSTEMS ANALYSIS AND DESIGN
26. How can a package vendor design a package to be flexible? 27. Why might the programming staff be opposed to the use of packages? 28. Is accounts receivable in every firm likely to use the same type of application? What
characteristics might differ among companies? 29. What is the user' s role in determining whether to acquire a package? 30. Develop an implementation strategy for R13.
10 years ago? 32. What are the advantages of proto typing? The disadvantages? 33. How does a prototype for a computer system differ from an architect' s model? How are they similar? 34. Why does a prototype need to be developed quickly? 31. Why is a package a more viable alternative to a custom system today than it was
CHAPTER 1 7 PROJECT
Exa m i n e Software Packages SAP's Rl3 is the most successful enterprise software package. Competitors in this market include Oracle, PeopleS oft, and Baan, to name a few. Find a company near you that has installed one of these systems and arrange to interview a senior man ager and someone in the IT area who worked on the project. Try to identify the re sources that the firm originally estimated it would need to buy and to install the system and also the extent to which the firm expected to change its procedures. Then ask the same questions for what really happened. How far off were the origi nal estimates? Can you describe the changes in procedures required to install the software? What problems occurred during installation? Did the company try to make any changes to the software or have the vendor do it? How long did the en tire project take? How does the actual time required compare to initial estimates? Based on your research, develop recommendations for installing enterprise soft ware for a company.
CHAPTER 1 8
I
III III III
I III
ce
Outline What Is Reengineering? What Is a Process? Reengineering a Process at Mntual Benefit Life Reengineering a Process at Merrill Lynch The Old System A New System Evaluation
Reengineering the Entire Firm a t Oticon Reengineering the Entire Firm at Lithonia Lighting Implications Reengineering: Success or Failure?
Focus on Change
Reengineering is about change. The original idea was to "obliterate" a process rather than try to improve it. The designer asks the fundamental question: Should the organization continue with this business process? If so, how can it be dramati cally improved? One hopes for an order of magnitude improvement in perform ance as a result of reengineering. The discussions early in the book, especially Chapter 4, suggest that you can use IT to change structure, moving toward the 493
494
PART FOUR: SYSTEMS ANALYSIS AND DESIGN
T-Form organization. In this chapter you will see examples of two firms that have reengineered the entire organization rather than a single business process. WHAT IS REENGINEERING?
In the early 1 990s, one of the most popular management topics was business process redesign, or reengineering. Discussions of reengineering have peaked, probably because so few firms experienced success in their reengineering efforts. We shall discuss some of the factors that are responsible for success and failure in business process redesign later in the chapter. The following is a good definition of reengineering: Reengineering is the fundamental rethinking and radical redesign of business processes to achieve dramatic improvements in critical, contemporary measures of performance, such as cost, quality, service, and speed. (Hammer and Champy, 1993)
This framework has four key words: 1. Fundamental. Why does the firm do things a certain way? 2. Radical. Get to the root of a process. Look for reinvention as opposed to mak ing superficial changes or minor enhancements to what is already in place. 3. Dramatic. Reengineering is not about marginal or incremental improve ments, but rather it focuses on achieving quantum leaps in performance. Re sults like a 10 percent improvement are not reengineering. 4. Processes. Traditional design often is centered on tasks, jobs, people, and structures. Reengineering looks at a business process that is a collection of ac tivities that takes one or more kinds of inputs and produces some output of value.
In an earlier article, Hammer described the spirit of reengineering as "obliterat ing" rather than automating. He argues that systems developers too often simply automate existing processes without thinking about the need for radical change. What does "obliterating a process" mean? Does one have to achieve an order of magnitude gain to claim a reengineering success? What are the likely impacts of a successful business process redesign effort on the organization? Figure 1 8- 1 sug gests that these characterizations of business process redesign are really endpoints on a continuum. Reengineering and radical change are on the right-hand side of the continuum; small enhancements or incremental improvements in a process fall to the left. (Possibly obliteration is off the scale on the right! ) It i s very likely that the middle o f the continuum represents an area o f maxi mum work for minimum payoff. This middle ground is a place designers should avoid. One contribution of reengineering is to call management's attention to the fact that designers should concentrate on incremental improvements or the radical redesign of processes. Working in the middle ground often results in high expendi tures to automate an existing, inefficient process. If reengineering creates such dramatic gains, why would the organization ever be satisfied with incremental improvements? First, managers should always be
CHAPTER 1 8: REENGINEERING: CHANGING BUSI NESSES AND BUSINESS PROCESSES
There is great interest in "enterprise sys tems." These systems offer solutions to all the major processing tasks in an organiza tion. They have appeal for a number of rea sons: The programs are already written, they are debugged, and they can be implemented in a shorter time than writing your own soft ware. There are, of course, a few disadvan tages. Fi rst, t h e vendors do not l i ke to change their code, and the customer loses some of the benefits of the packages if he or she does a lot of modification. As a result, the vendors encourage the customers to change their procedures to fit the software. These systems are large, and implementing them is not trivial; SAP has some 8000 con figuration tables that must be completed to install the system for a particular customer. PeopleSoft is another enterprise software vendor. A list of their major subsystems pro vides a good overview of enterprise software: Distribution: focus on supply chain management
FIGURE 1 8·1
Avoid the middle ground.
Manufacturing: encompasses engineering, production planning, cost management, bills and routings and production management Financials: includes general ledger, payables, receivables, asset management, project management, budgets, exp'9nses, and treasury Human resources management: focus on personnel administration, recruitment, training, care,er planning, compensation, health and safety, regulatory requirements, and benefits Enterprise software from PeopleSoft, SAP, and Oracle has been very successful as managers decidH that the effort to implement the package is acceptable if it results in a comprehensive system that can be used sooner rather than later. Do you think the installation of these systems mandates reengineering? Why or why not?
495
496
PART FOUR: SYSTEMS ANALYSIS AND DESIGN
looking at ways to improve work processes. Second, reengineering often results in dramatic reductions in the workforce and demands more work from those remain ing. Management has to balance its obligation to improve processes against the firm's responsibility to its employees. Working on the reengineering side of the continuum is risky. Changes of great magnitude may even appear to some as doing violence to the organization. When management selects reengineering over incremental improvement, it is taking greater risks in the hope of obtaining greater benefits. In fact, if one takes a more historical view, the evolution of applications systems can be character ized by on-going incremental improvements punctuated by major reengineering efforts. WHAT IS A PROCESS?
Most of our discussion to this point has focused on the structure of the organiza tion and how IT design variables can be used to change structures. The main con tribution of reengineering for us is to focus attention on processes as opposed to structures. What is a process, and how is it related to structure? One of the fundamental processes for a firm that sells a product is order ful fillment. Picture a mail-order firm in which operators take orders when cus tomers call on a toll-free number. The order-entry department is responsible for talking to customers and entering their orders into a computer system. The sys-
CHAPTER 1 8: REENGINEERING: CHANGING BUSINESSES AND BUSINESS PROCESSES
tem checks a "book" inventory to determine if the goods requested are available. If so, it produces a picking list for the warehouse staff to use in completing the order. If the requested merchandise is out of stock, the system notifies the pur chasing department that it is time to reorder, and it creates a backorder on the system so that it can fill the order when a new shipment arrives. This brief scenario describes the order fulfillment process, a process that cuts across at least three departments in the structure of the organization: order entry, warehousing, and purchasing. Business process redesign is likely to employ four or five of our IT design variables from Chapter 4. The radical reorganization of a process is likely to result in technological leveling as tel;:h : nology is used to reduce the need for multiple layers of management related to a process. Reengineering is often associated with production automation and electronic workflows as well as virtual components. It may also introduce technological matrix lng in the redesign ing of business processes. REENGINEERING A PROCESS AT MUTUAL BENE:FIT LI FE
One of the early examples of reengineering was at Mutual Benefit Life Insurance Company. Before business proces s redesign, Mutual Benefit Life (MBL) processed life insurance applications in a long, multistep process that included credit checking, quoting, rating, underwriting, etc. An application might go through 30 steps across five departments with up to 119 people involved. Typical turnarounds ranged from 5 to 25 days. Another firm estimated that a life insurance application spent 22 days in process for 17 minutes of actual work. To redesign this process, MBL used computer networks, databases, and an ex pert system to make information and decision support available to employees. It created a new position called a case manager who is a process owner. This person acts as a case manager and has total responsibility for an application from the time it is received until a policy is issued. Files are no longer handed from one person in a chain to another across departmental boundaries. Case managers are able to perform all the tasks required to process an insurance application because they have technology to help them. An expert system provides advice while their PC based workstation connects to a variety of databases and applications on a main frame computer. What were the results? MBL can now complete an application in as little as four hours, and the average time to tum around an application and issue a policy is two to five days. The company was able to eliminate 100 field office positions while its case managers can handle nearly twice the volume of applications MBL could previously process. It is a sad footnote that MBL's investment per formance was not as good as its reengineering; the State of New Jersey assumed control of the company. One has to be able to manage all aspects of the business to be successful! This example shows the use of production automation in which workstations provide the information needed for an individual to make a dec lsion. The worksta tion, mainframe computers, and network create a virtual applications processing
497
498
PART FOUR: SYSTEMS ANALYSIS AND DESIGN
work flow for each case worker. He or she has access to credit checks, quotations, ratings, and underwriting electronically rather than physically. REENGINEERING A PROCESS AT MERRILL LYNCH
Merrill Lynch is the largest brokerage and financial services firm in the United States with over 500 branch offices. The objective of the securities processing operation is to receive certificates from customers, perform the proper process ing of the certificates, and post data to customer accounts (Lucas, Berndt, and Truman, 1 996). A very high-level process flow consists of the following steps: The customer brings documents to a branch office. The branch does preliminary processing. Certificates are sent to a processing center. The center verifies and checks the certificates. The center processes certificates. 6. The center posts data to the customer's account. 1. 2. 3. 4. 5.
Fidelity I nvestments is the largest financial mutual funds firm in the US. The company has tried to revolutionize personal investing and its own operations. The company devel oped a huge mailing plant in Covingto n , Kentucky. W h i l e most fi rms consider the mailroom a backwater, Fidelity has managed to keep its costs low by focusing on all the details of its operations. It regards mailing as a core process for retaining customers. The company has spent over $1 00 million on its facility, a 1 88-acre office park. The plant runs 24 hours a day, seven days a week to generate 1 40 million pieces of mail in a year, more than double that of Vanguard Group, its closest rival. The ware house consists of 256,000 square feet of space. Robots retrieve prospectuses while specially built conveyor belts and carousels contro l l e d by software move materials through the huge rooms in the center. Inter communicating computers coordinate the process.
Fide lity stresses customer service; it promises that items requested by phone one day will b e mailed the next. All re quests for i nformation one day are sent electron ically at 2 A . M . to the Covington plant. Computers download the names and addresses of those requesting material into i n k jet mach i n es that address the cover page and add metered postage. Machines optically read the zip code, spray on a Postal Service bar code, sort the mail, and distribute it to different trays. About 90 per cent of the mail goes directly into Postal Service trucks and to the airport, bypassing the local post office. Is this a reengineering project? It com pares favorably with t h e M e r r i l l Lynch imaging system discussed in the chapter. To constitute obliteration, however, Fidelity will have to convince all its customers to use its Web site and print their own materi als; then they can get out of the printing business!
CHAPTER 1 8 : REENGINEERING: CHANGING BUSINESSES AND BUSINESS PROCESSES
On a typical day, Merrill Lynch offices around the U.S. receive some 3500 se curities that need processing of some kind. What are some of the reasons for cus tomers bringing securities to a branch office? 1. The customer has sold the stock and must surrender it so shares can be issued to the buyer. 2. A person has inherited stock and must have the shares registered in his or her name. 3. A company has reorganized and has called its old stock to issue new shares. 4. A bond has been called by the issuer. 5. A customer wants Merrill to hold his or her securities. The Old System
The customer brings the security plus other supporting documents to the branch office cashier. The cashier provides a receipt and "batches" all the securities to gether to be sent for processing. Before the development of a new process, the branch would send these documents to one of two securities processing centers (SPCs), either in Philadelphia or Chicago. (See Figure 1 8-2 for a high-level DFD.) The objective of securities processing at the centers was to credit the customer's account as soon as possible, certainly within the 24 hours suggested by the Securi ties and Exchange Commission. Because of exceptions and the possible need to contact the customer again, sometimes it was not possible to achieve this goal. A good example of problems is in the area of legal transfers when someone inherits stock. There are requirements for supporting documents like a death certificate. If the customer does not bring the documents and the branch does not catch the fact that a necessary piece of paper is missing, the securities processing center must contact the branch and ask them to contact the customer. Because many of the securities are negotiable, the security processing centers must be extremely careful in processing. Merrill Lynch is required to keep an ac curate audit trail whenever it moves a security. This requirement led to frequent, repeated microfilming of securities as they moved around a center. To the Merrill Lynch financial consultant (FC) or broker, the securities pro cessing task seemed to require an inordinate amount of time and lead to numer ous problems. (There are some 15,000 FCs at Merrill.) The branch operations staff had to continually monitor accounts to see if securities were credited prop erly. FCs were forced to contact clients to obtain additional documents. There was a great deal of friction between the sales side of the business and the securi ties processing department. All of these reasons plus the labor-intensive nature of processing led to a desire to improve securities processing. The most radical approach would be to obliterate the process entirely. Unfortunately, this option is out of Menill Lynch's control. While there has been much publicity about "book entry" shares of stocks, there still are a large number of physical shares of stocks and bonds in circulation. Obliterating the process would require industry-level and government cooperation to eliminate all physical certificates, replacing them with an electronic record. This
499
500
FIGURE
PART FOUR: SYSTEMS ANALYSI S AND DESIGN
1 8·2
SPC overview.
solution would also require consumer acceptance and a massive effort to electroni cally record and eliminate all existing paper certificates. After suggestions by the operations staff and extensive research, the systems group at Merrill Lynch proposed a new process using image technology to capture an image of the security certificate and related documents that accompany a trans action. The focus of the project was on work-flow redesign, not just the use of image processing. Work-flow redesign involved the closing of the two processing centers described above and the development of a securities processing department at a single site in New York (now New Jersey).
CHAPTER 1 8 : REENGINEERING: CHANGING BUSINESSES AND BUSINESS PROCESSES
FIGURE
1 8-3
Branch operations.
In the old process, customers brought securities and supporting documents to a branch office or sent them to Merrill through the mail. This set of documents will be referred to as a "certificate," the terminology used at Merrill Lynch. After re ceiving the certificates, the branch conducted a manual review for negotiability. If this preliminary review verified that the security was negotiable, a clerk typed a receipt for the customer. If the certificates appeared not to be negotiable, the clerk told the customer what additional information was necessary to complete the transaction (see Figure 1 8-3). During the day, several branch clerks accepted certificates and accumulated them. At the end of the day, a courier took all certificates to one of two SPCs in Philadelphia or Chicago. The clerks attached a manually prepared manifest to the package summarizing its contents. Normally the package arrived at the SPC the next day. Upon arrival, an SPC clerk inspected the package and checked that its contents matched the manifest.
501
502
PART FOUR: SYSTEMS ANALYS I S AND DESIGN
The clerk contacted the branch office to resolve any discrepancies. All certifi cates that matched the manifest continued to the next stage in processing (see Figure 1 8-4). The first step after opening the packages was to microfilm all the certificates. Next, clerks conducted a second negotiability review that is contingent on the type of transaction: legal or nonlegal. An example of a legal transaction is a stock trans fer because the customer inherited the security. Regulations require that certain documents accompany the security, for example, a death certificate for the person in whose name the security is currently registered. If further review showed the certificate was not negotiable, it was segregated. A clerk logged this status into a Merrill Lynch securities control system. Once classi fied as negotiable, the certificate moved to a final holding area for distribution.
FIGURE 1 8-4 SPC operations.
CHAPTER 1 8: REENGINEERING: CHANGING BUSINESSES AND BUSINESS PROCESSES
The SPCs sent 80 to 90 percent of the certificates directly to depositories. The remaining certificates were distributed to specialty departments in New York for further processing; for example, one department handles exchanges of stock ne cessitated by a stock split. Upon arrival at a depository or at a Merrill specialty de partment, the certificates were again microfilmed and staff members updated their status in the control computer system. Certificates were microfilmed yet again be fore consignment to their final holding area. Why did this process entail so much microfilming? Merrill Lynch must care fully control securities and credit them to a customer's account as soon as possi ble. Given the volumes of paper involved, microfilming became an integral part of the control process. Merrill Lynch must also pass audits by the SEC, which checks controls on securities processing. A New System
Merrill Lynch completely redesigned the SPC process. As in the old process, cus tomers bring securities to a branch office or mail them to Merrill Lynch. The branch cashier conducts a preliminary negotiability review supported by an expert system (see Chapter 22). This system helps the cashier determine negotiability sta tus. It also prints a customer receipt and generates a document control ticket that travels with the certificates. The expert posts a record of the certificate to a com puter file, including a unique identifier number for the transaction. At the end of the day, clerks package all certificates to be taken by courier to the single securities processing center in New Jersey. The system generates a man ifest sheet for the package and updates a manifest file so that it contains informa tion on the shipment. At the SPC, the staff first wands a bar code on the package to verify receipt. Clerks check the package against the manifest; if there is a discrepancy, they up date computer files and the system notifies the branch of the problem. Branch per sonnel have access to these files so they can check the status of processing of any security at any time (see Figure 1 8-5). Negotiability must be verified in the new process, both for legal and non legal documents. However, the presence of the expert system in the branches reduced the number of certificates arriving without the documents needed for negotiability by 50 percent for legal documents and 75 percent for nonlegal documents. A major technological innovation in the process was the introduction of image scanning and character recognition for certain key fields on the stock cer tificate. The scanning system recognizes a reference number via the bar code on the control sheet accompanying the certificates. The system uses the reference number to access the computer record which shows the scanner operator the cer tificates included in the transaction. The operator scans the certificates and any legal documents. At this point the images and physical certificates diverge (see Figure 1 8-6). The scanned certificate image undergoes a character recognition procedure to turn three areas of the image into characters that can be processed by a computer
503
504
PART FOUR: SYSTEMS ANALYSIS AND DESIGN
FIGURE 1 8·5
New system branch operations.
(see Figure 1 8-7). From a technical standpoint, this recognition employs a propri etary algorithm embedded in "firmware" in the imaging computer. This recogni tion process converts three important fields from image to character format: the CUSIP number (a unique number for each security assigned by the securities in dustry), denomination of the security, and the security number. These three num bers are already recorded in the computer; recognition of the imaged fields is to establish rigorous control and provide assurance that the correct documents have been scanned.
CHAPTER 1 8: REENGINEERING: CHANGING BUSINESSES AND BUSINESS PROCESSES
FIGURE
1 8-6
Image capture.
The recognition task is complicated by the fact there are no standard formats for securities. The three fields may exist any place on the security. The recognition algorithm needs to know where to look for the fields it is trying to convert. This information comes from a template database that indicates where the three fields are located on the security. Merrill has developed a template for each CUSIP and date of issue combination. The scanning computer routes any certificate whose template is not yet in the database to a workstation operator. The operator uses a mouse to draw a box around each field and the system records this location infor mation in a new template for the security. The system performs the image-to-character conversion by referencing the image, overlaying the template, and executing the algorithm. If the converted character fields match the same fields from the computer, the system updates the computer files to show that scanning is complete and stores the images for this
505
506
PART FOUR: SYSTEMS ANALYSIS AND DESIGN
FIGURE 1 8·7
Character recognition.
transaction permanently to optical disk. If there is a mismatch between the con verted characters and the computer record, or another nonrecognition problem, the system refers the transaction for key editing. There, operators examine the image and input data to unrecognized fields. The staff takes the physical certificates for distribution to their final location. The system executes a procedure to provide routing orders for each certificate, and it specifies a destination box for the certificate. When a user needs access to security information, he or she can retrieve the image of the security on a graphics workstation. There is no need to access the physical security or to hunt through microfilm records, a process that could take as long as three days with the old process.
CHAPTER 1 8: REENGINEERING: CHANGING BUSINESSES A N D BUSINESS PROCESSES
TABLE 1 8· 1
EVALUATION OF CERTI FICATE PROCESSING
Changes in organization structure Elimination of two securities processing centers and the consolidation of all securities processing in a central site Changes in work flows and functions performed Branch office input changes Branch office customer receipt Anticipated receipt information Package receipt and bar coding Elimination of most microfilming Legal negotiability work-flow changes Imaging operation, scanning, and key editing Retrieval of image rather than physical security Interface changes Branch office interface Customer interface Worker interface with scanning equipment User interface retrieving images Major changes in technology Expert system to assist branch cashier receiving certificates Incorporation of scanning to replace most microfilm and provide better control, including: Scanners Template definition Key edit Computer facility with optical disk jukebox Retrieval of scanned documents Modifications to existing control system Impact Improvements in customer service Better customer receipt More information captured at point of contact System can be queried for status of processing Better control Certificate level control High-quality images compared to spotty microfilm Reduction from 3-day searches for microfilm to instantaneous retrieval Significant cost reduction Reduction in research time
Evaluation
Table 18-l lists the major changes in the Merrill Lynch SPC process. The reengineer ing effort resulted in the elimination of two process centers and the creation of a se curities processing department at a central site. The process supports major changes in tasks and work flow, beginning with the receipt of securities at a branch office. The interface to the process for all groups having contact with it has also been changed. Technology changes include the expert system for the branch office input, scanners, a template library, character recognition from images, and optical disk storage. There have been significant increases in the level of customer service and
507
508
PART FOUR: SYSTEMS ANALYSIS AND DESIGN
the quality of support that securities processing provides to the branches. There is much less handling of physical securities, and retrieval time for a certificate image is nearly instantaneous. The time to research a security has been dramati cally reduced: from up to three days in the old process to virtually instanta neously in the new. The new securities processing system has had a dramatic impact on resources: Reduction of occupancy from two locations to one Reduction in depository fees Interest savings on receivables Reduction of microfilm costs Savings in security services 6. Reduction in staff of 168 positions, leaving a current total of 165 (including temporary staff)
1. 2. 3. 4. 5.
The new process required an investment of approximately $3 million. The return on the investment was calculated as a payback period of less than two years, which translates to a saving of around $ 1 .5 million a year. This example shows how one can execute a major redesign of a business process. Merrill Lynch used technology along with process redesign for technological level ing and reducing the number of processing centers and the number of managers needed to staff them. It applied information technology to automate the flow of cer tificates through the SPC, a form of production automation. The image system cap tures the certificates electronically, and employees in different departments can re trieve the image of a certificate in seconds without the need to visit a vault. The certificate image can be routed to any terminal capable of displaying it within Merrill Lynch, illustrating electronic work flows. (Subsequently, Merrill Lynch outsourced all securities handling to a third party; the simplification of securities processing has made it possible to tum over all handling of securities to a separate firm that will use electronic linking and communications to work as a partner with Merrill Lynch.) Merrill Lynch's SPC reorganization illustrates how one can use business process redesign to make substantial changes in one part of an organization. The SPC is one area in a very large firm. Are there examples where process redesign has affected the fundamental structure of an organization? REENGINEERING THE ENTIRE FIRM AT OTICON
Bjorn-Anderson and Turner ( 1994) have written about the success of the Danish company, Oticon. This firm is one of the five largest hearing aid manufacturers in the world, with approximately 1200 employees and sales of $80 million. Oticon exports more than 90 percent of its production to over 100 countries. The firm has its own research department and production facilities. Oticon has positioned itself to be the preferred partner for leading hearing aid clinics around the world. Company headquarters are in the Tuborg industrial park to the north of Copenhagen, and there are three manufacturing facilities in Den mark and other countries.
CHAPTER 1 8: REENGINEERING: CHANGING BUSI NESSES AND BUSINESS PROCESSES
While the I RS admits to spending $1 0 billion on systems that do not work in the real world, the state of Kansas has reengineered its revenue service. The process includes seven steps: 1 . Mail trucks deliver returns to the pro cessing center. 2. A machine opens and sorts returns into two groups, those with and without checks attached. 3. A person opens the returns and re moves them from their envelopes, sort ing them by type. 4. An operator scans the returns into the computer. Another computer scans all payments and credits and applies them to a taxpayer's account. 5. The computer notifies an operator if it encounters any problems during scan ning. In addition, thousands of clerical staff members type key information from the returns into a computer system. 6. A collection agent uses information on a screen to contact a taxpayer and re solve any problems. He or she can make the correction immediately online. Programs check the arithmetic and put returns on tape for storage. 7. The agency sends letters to taxpayers notifying them of errors.
I n o n e instance a taxpayer called and asked for an overdue refund check. A cus tomer service representative asked for his social security number and used it to ac-
cess his records on the system. The repre sentative could see an image of the tax re turn and a report showing that the post of fice had returned the check because the taxpayer had moved. The representative asked for his new address, entered it in the system, and assured the taxpayer that the check would go out the next day. I magine this kind of service coming from the federal Internal Revenue Service! Current I RS pro cessing is scattered among 50 computers, most of which do not com m u n icate with each other. A new tax c o m m i s s i o n e r in Kansas changed not only the system but the culture as well. The idea is to treat taxpayers as customers and assume that most of them are honest. The revenue service's job be comes one of helping them understand and pay their taxes. If the agency views its role as one of helping people rather than en forcement, it expects compliance and rev enues to increase. The commissioner is also working to get more people to file electroni cally. Imagine the number of keystrokes fed eral and local tax staff workers make to key tax returns for the country. If many people al ready key their own taxes into PC tax preparation programs, why not convince them to transmit the data directly to the rev enue agency? Given the size of the effort nationwide to collect taxes, a small amount of reengineer ing can save millions of dollars and provide better customer service.
The company began producing its own hearing aids during World War II. It was family owned until 1956 when new management took over and began mass pro duction. By the end of the 1970s Oticon had reached the number one position in the world market with a 1 5 percent share and sales in over 100 countries. It was a leader in miniaturization for hearing aids worn behind the ear. From 1979 through 1985, Oticon's market share dropped from 1 5 percent to 7 percent as competitors developed hearing aids that fit inside the ear. The com pany had losses in 1986 and 1987, leading the board to bring in new management.
509
51 0
PART FOUR: SYSTEMS ANALYSIS AND DESIGN
A new president, Lars Kolind, came to Oticon in 1988. His first action was to start a cost-cutting program in an attempt to regain profitability. Kolind also changed the firm's marketing strategy. For years, Oticon stressed high-quality hearing aids, but now competitors were also building quality units. Kolind decided that the most appropriate strategy for Oticon was quality and customer satisfaction. Oticon fo cused its business on dispensers or retailers of hearing aids who were most inter ested in producing satisfied customers (see Figure 1 8-8). After two years, Kolind realized that cost cutting and a new marketing strategy had accomplished about all they could. I sat down on New Year's Day . . . and tried to think the unthinkable; a vision for the company of tomorrow. It would be a company where jobs were shaped to fit the person instead of the other way around. Each person would be given more functions and a job would emerge by the individual accumulating a portfolio of functions.
Kolind wanted to transform Oticon from an industrial organization producing a standardized product to a "high quality service organization with a physical prod uct." He envisioned an organization in which various functional units worked to gether in an integrated manner to develop innovative products. Kolind realized that he would have to create a new flexible organization. Kolind wrote a memo describing Oticon as one team of 150 employees at head quarters, all continuously developing and learning new skills. Each employee should be able to do several tasks-those he or she already did well and those where the employee would be challenged to learn new tasks. The idea was not to focus on functional expertise, but for each person to be able to do several jobs. Kolind also felt that paper hindered efficiency because paper hides information in stead of sharing it. He imagined computer systems that would eliminate paper and allow all employees to share information. FIGURE
1 8·8
The Oticon web site.
CHAPTER 1 8: REENGINEERING: CHANGING BUSINESSES AND BUSINESS PROCESSES
Kolind called his new plan a "spaghetti organization" since he envisioned people playing multiple, intertwined roles in the firm. To begin, he combined two separate offices into a new building designed for his new organization. Unlike many business process redesign projects, Kolind invited the participation of his employees in designing the new organization. It should be noted that, at first, there was a great deal of resistance to Kolind's proposals. When Kolind backed off a plan to move headquarters to Jutland, a remote part of Denmark, and chose instead to locate in the Tuborg industrial park, resistance faded. It is clear that the changes described below would not have happened without Kolind's strong and forceful leadership. The first step was to eliminate traditional departments. The head office became one large department and work was organized as projects. Oticon views projects as temporary. Employees with different skills work together on different projects. This team-oriented arrangement works very well when the workload is uneven. In a more rigid structure, the marketing department would have to be staffed to han dle its heavy load in the fall for exhibitions and trade shows. In the new structure, the marketing task becomes a project and enough resources are assigned to com plete it. Normally, about five people work consistently on marketing tasks. When the busy season arrives, this core group recruits other employees with different backgrounds, like R&D, to help out. The second major innovation was to organize work in the form of projects. There is a project manager and a number of other employees who work on the project. The project manager is responsible for staffing the team and for carrying out the task. A project manager advertises the project on an electronic bulletin board on the Oticon system, and employees at their workstations sign up for the project. Employees occupy several positions at Oticon depending on the number and variety of projects for which they volunteer. This approach to organizing takes maximum advantage of diversity. An employee in accounting might sign up for a project involving marketing, bringing a whole new perspective to the marketing project. To be successful, Oticon had to adopt a new philosophy of control. Management must trust employees to sign up for projects. This volunteerism should result in greater commitment to the firm and to more worker responsibility. Managers spend less time monitoring workers while managers must be innovators and motivators. To bring about this new structure, Oticon had to rearrange its physical and tech nology domains. First, Kolind eliminated all private offices, including his own. All employees have identical desks and chairs in a large open space. There is a work station and a mobile phone charger on the desks. Desks are not assigned. A worker moves his or her small lockable caddie to a desk. The caddie has a drawer for per sonal items and shelves for storing up to 10 files. Access to information is gained through the workstation. Kolind also wanted to banish paper, and Oticon's technology eliminates 95 per cent of the paper in the office. The company scans all documents as they are re ceived, and workers are prohibited from keeping paper files. Original documents
51 1
51 2
PART FOUR: SYSTEMS ANALYSIS AND DESIGN
are shredded. All of this information is stored in electronic form, and users can re trieve it from their workstations, assuming they have access rights. When an employee enters his or her ID into the workstation, the system is con figured with that individual's electronic desktop. The system has tools for creating, transmitting, and storing documents containing text, drawings, and graphics. This combination of physical and electronic flexibility makes it possible to create task forces almost immediately to solve a problem. Oticon has enjoyed a return to profitability; 1992 profits were nine times better than those of 1 989 and 1 990. Sales are increasing, and the company has reduced its cycle time to market new products. A new hearing aid that adjusts itself to the level of ambient sound was brought to market six months earlier than it could have been without the new organization. Oticon demonstrates technological leveling, using the technology to reduce lay ers of management and substitute work groups. This approach also changes the role of the manager, making this person much more of a leader than a person who monitors employees. The company also illustrates technological matrixing since employees work on many different projects. Information technology helps form the project teams, facilitates communications, and provides tools to team members to help accomplish their task. Oticon has created a highly flexible and virtual or ganization through process redesign combined with the use of several IT design variables. Oticon is a good example of a firm making progress toward becoming a T-Form organization. It also shows how reengineering can be applied at the level of the firm rather than a business process. REENGINEERING THE ENTIRE FIRM AT LITHONIA LIGHTING
Our last example of reengineering also involves an entire organization, though we are not sure others would call it reengineering. Lithonia Lighting was founded in 1 946 in Lithonia, Georgia. The current senior management team arrived in the early 1960s to a strong, regional company. There were few national firms in the in dustry, and Lithonia was no exception with sales of $ 1 8 million primarily in the southeast (see Figure 1 8-9). Management embarked on a strategy of becoming the number one lighting sup plier in the U.S. Most of Lithonia's growth was internal, though they did buy a few other companies. By 1 990, an industry of over 1 300 companies coalesced into nine major manufacturers of lighting fixtures, which accounted for 75 percent of industry sales. In 1990, Lithonia had sales of over $700 million. The lighting industry has complex distribution channels. Lighting can consume 50 percent of the electricity in a commercial building, and architects work with contractors to manage this kind of energy consumption. Most of Lithonia's prod ucts are aimed at the commercial lighting industry, which means the customers are industrial builders, not end users. Architects, contractors, electrical engineers, dis tributors, and agents are all involved in Lithonia's sales. The industry has found it must sell through lighting agencies rather than sales people. Lithonia deals with about 85 independent lighting agencies. An agent sells
CHAPTER 1 8: REENGINEERING: CHANGING BUSINESSES AND BUSINESS PROCESSES
FIGURE 1 8·9
The Lithonia Lighting web site.
to distributors who in turn sell fixtures off the shelf. However, the majority of agency sales come from efforts to influence the buyers for large construction proj ects, such as a new office building. The agents do not stock products nor do they carry inventory. The electrical contractor who bids successfully on a project makes the ultimate decisions on what fixtures to buy. Agents tend not to handle compet ing products. In 1 979, the IS manager at Lithonia was asked to find a way to tie together all of the major players in Lithonia's business including agents, distributors, contrac tors, warehouses, and so on. The IS manager's team soon found that it had to take Lithonia out of the center of its diagrams. The only picture that made any sense was to put the agent at the center of the diagram. This exercise convinced Lithonia to change the way it looked at its business: The agent became the key to sales. Lithonia developed a series of innovative computer and communications applications called Light*Link to coordinate sales and distri bution. In fact, the high level of cooperation between the CEO and IS manager at Lithonia won an award from the Society for Information Management (SIM). The general assessment of the Light*Link system is that it generated consider ably more sales volume without a concomitant increase in staff. In fact, one agent changed its ratio of sales representatives to administrative staff from 1 : 1 to 3 : 1 . Lithonia credited the system with dramatic gains in sales. Of course, w e should be cautious about such claims because sales are primarily determined by the health of the construction industry. Lithonia developed its new concept of business before anyone invented reengi neering or business process redesign. In retrospect, it seems to be a clear case of a firm redesigning itself and its processes with a fresh view of the environment. The Light*Link system provided a number of electronic work flows between the
51 3
51 4
PART FOUR: SYSTEMS ANALYSIS AND DESIGN
company and its agents and enhances communications within Lithonia. To some extent, the systems also provided production automation as computers were able to generate some quotations and specifications for customers. IMPLICATIONS
In summary, Mutual Benefit Life and Merrill Lynch represent classic cases of business process redesign. Each firm first looked at its own business in detail. Reengineering's major contribution to management is its focus on process and on be asked whether or not a process, itself, is necessary. The questions that should be asked include: 1. What are our key business processes? 2. Do we have to execute this process at all? 3. What totally new ways, taking advantage of information technology, exist to perform this process? 4. What does redesigning a process imply for the structure of the organization? 5. How can we use IT design variables in conjunction with process redesign to change the structure of the organization?
Oticon and Lithonia practiced a different kind of reengineering. They focused on the entire organization instead of isolated business processes. In their reengi neering efforts, these firms used technological leveling to reduce the number of layers of management and supervision. They substituted electronic work flows for the physical movement of documents and applied production automation where possible. Technological matrixing helped solve problems and encourage employees to make decisions themselves rather than refer problems up a manage rial hierarchy. All of these changes combined produced organizations with virtual components.
CHAPTER 1 8: REENGINEERING: CHANGING BUSI NESSES AND BUSINESS PROCESSES
Reengineering: Success or Failure?
As mentioned in the introduction to this chapter, some of the popularity of reengi neering has waned since it is estimated that only 30 percent of business process .re design efforts have been successful. What are the reasons for this lack of success? Reengineering seeks very large changes, the kind that are the most difficult to im plement and the most risky. A process often involves multiple organizational sub units so the change may involve organizational structure as well as operations. Michael Hammer, one of the founders of the field, stated that he and his col leagues "forgot about people" in developing reengineering principles. Adopting reengineering to cut staff is not likely to produce positive results. The real benefit comes from reorganizing work to make people more productive. The examples in this chapter demonstrated strong management interest and leadership; it is also possible that some reengineering efforts have failed because of a lack of a project champion in management. We explore change and implementation in the next chapter. As you read Chapter 19, think about the magnitude of the changes de manded by reengineering. Is it surprising that not all reengineering projects are successful? CHAPTER SUMMARY
1. Reengineering focuses attention on business processes. These processes are related to tasks and they cut across functional departments in an organization. 2. Reengineering seeks to make radical changes in the organization, for example, a ten-fold improvement in outcome variables. 3. It may be possible to eliminate a process entirely or to tum it over to an exter nal organization so that it becomes a virtual component of your organization. 4. There may be a limit to the number of reengineering efforts an organization can mount at one time. They require capital and human investment, and they can be traumatic for the people involved. 5. Incremental improvement is a reasonable strategy for a number of systems in the organization. 6. It is wise to stay out of the middle ground shown in Figure 1 8- 1 , where you end up investing a great deal for only modest improvements. 7. Reengineering applies to the structure of the entire organization as well as to individual business processes. 8. A company like Oticon offers an example of applying the IT organization de sign variables from Chapter 4 to restructuring a company that was losing mar ket share and money. 9. A manager needs to stay alert to the opportunities for reengineering processes for the entire organization. 10. Reengineering serves to focus attention on business processes and the differ ence between radical and incremental change. 11. Reengineering has not been completely successful, primarily because of the magnitude of the changes it entails and the difficulty of changing organiza tions in general.
51 5
51 6
PART FOUR: SYSTEMS ANALYSIS AND DESIGN
IMPLICATIONS FOR MANAGEMENT
It is difficult to create the significant improvements in a process demanded by reengineering. You may want to limit your efforts to a reasonable number of reengineering projects because of the problems associated with creating massive changes in an organization that go with each project. Reengineering the entire firm, as attempted by Oticon, is also a major challenge. However, if organizations want to remain competitive in the twenty-first century, they will have to take ad vantage of IT in structuring themselves. You may not want to call it reengineering, but you will want to make major changes in the processes and organizations you encounter during your career. KEY WORDS
Character recognition Electronic work flows Expert system Incremental improvement Obliterating a process Process Production automation Radical change Reengineering Spaghetti organization Technological leveling Technological matrixing RECOMMENDED READING Bjorn-Anderson, N.; and J. Turner. "Creating the 21 Century Organization: The Metamor phosis of Oticon," IFIP Working Group 8.2 Conference, August 1994. (A good descrip tion of changes at Oticon.) Davenport, T. Process Innovation: Reengineering Work Through Information Technology. Boston: Harvard Business School Press, 1993. (A readable account of reengineering.) Hammer, M. Beyond Reengineering: How the Processed-Centered Organization Is Chang ing Our Work and Our Lives. New York: Harper Collins, 1997. (This is Hammer' s newest book on business reengineering and covers many current issues and problems re lated to organizations' reengineering initiatives.) Hammer, M . ; and J. Champy. Reengineering the Corporation. New York: Harper Collins, 1993. (An expansion of Hammer' s first paper with a number of examples of reengineering. ) Huizing, A.; E. Koster; and W. Bouman. "Balance in Business Reengineering: An Em pirical Study of Fit and Performance", lMIS. 14, no. 1 (Summer 1 997). pp. 93-1 1 8. (A very good article addressing the importance of organizational fit in business reengineering. ) Kettinger, W.; J. Teng; and S. Guha. "Business Process Change: A Study of Methodolo gies, Techniques, and Tools," MIS Quarterly. 2 1 , no. 1 , 1997, pp. 55-80. (This paper
CHAPTER 1 8: REENGINEERING: CHANGING BUSI NESSES AND BUSINESS PROCESSES
presents a well-defined framework for studying business reengineering processes in cluding Business Process Redesign (BPR) methods, techniques, and tools.) Levent, O. "A Model Management Approach to Business Process Reengineering," JM/S. 15, no. 1 (Summer 1998). pp. 1 87-2 12. (A thorough article dealing with redesigning business processes after the introduction of information technologies.) Lucas, H. C., Jr. ; D. Berndt; and G. Truman. "A Reengineerlng Framework for Evaluating a Financial Imaging System," Communications of the A CM. 39, no. 5 (May 1996), pp. 86-96. (A discussion of the Merrill Lynch system.)
DISCUSSION QUESTIONS What is a business process? How does it relate to a function? your definition of radical change? 3. What is incremental change? Where is it appropriate? 4. What is "the middle ground," and how can it lead to problems? 5. What is the difference between an image and a character representation of, say, this page of text? 6. What is a spaghetti organization? 7. What problems do you see in an organization that does not seem to have a formal or ganization chart? 8. How does Oticon staff projects? 9. What is the role of the expert system for receiving securities in the Merrill Lynch branch office? 10. If the Merrill Lynch control computer has information from the expert system, why is it necessary to recognize three fields on the documents scanned in the SPC? 11. Why did Lithonia Lighting find it necessary to put its agents at the center of its busi ness processes? 12. How did Mutual Benefit Life use technology to change the way its staff processed in formation? What other kinds of assembly line processing of information might make use of this kind of reengineering? 13. What is the major contribution of reengineering? 14. Why has reengineering been so popular with senior management? What kind of busi ness strategy does it promote? 15. Is reengineering fundamentally driven by technology? 16. Look at a firm or at your university and outline the major business processes. Then ex amine what functional departments play a role in each process. 17. What role does comparing your operations with those of similar companies play in reengineering? 18. How did reengineering make it possible for Merrill Lynch to outsource some of its se curities processing operations? 19. Do you think Oticon's success has been influenced by the fact that it is located in Den mark with a different tradition of worker-management relationship than the U.S.? Do you think Oticon's structure would work in another country? 20. The U.S. healthcare system is often described as a candidate for major change. Do you see a way to reengineer it? 1.
2. What is
51 7
CHAPTER
I
19
I
e
g
ng
Outline Implementation What Is Implementation? Success or Failure
Research on Implementation A Model of Implementation The Implementation Process
An Implementation Strategy The Role of Design Teams
An Implementation Framework Some Examples Emergent Change
Implementing IT-Based Transformation of the Organization Analyzing the Costs and Benefits of Change Motivating Organizational Change A Change Program
Beyond Structural Change
51 8
CHAPTER 1 9: I MPLEMENTING CHANGE
Focus on Change
This chapter is about one of the most important characteristics of change: how you bring it about. Implementing change is a very difficult task for a manager, yet change is the reason for deploying innovations in information technology. For IT to transform the organization, you must be successful in implementing change. The manager must take advantage of what the technology offers to restructure the organization. As suggested in earlier chapters, we think that IT will naturally lead toward the T-Form organization structure. •
The application of information technology implies change; individuals and or ganizations adopt technology to change and improve the status quo. In Chapter 1 , we described a hierarchy of change: Within the organization Organization structure Interorganizational relations The economy Education National development. In this chapter we explore the nature of these changes, emphasizing how one can increase the probability of success in implementing new technologies. Change happens one application of technology at a time. The changes de scribed earlier in organization structure, relations among organizations, and the economy all occur as the result of the implementation of many individual technol ogy initiatives. We know that developing a system is a complex task; there are many activities and subtasks involved. Table 19-1 lists some of the things that can go wrong in developing a system. The system may be very unpopular in the organization. Employees may object to a substantial reengineering project because they do not like the changes the ef fort is likely to make in their jobs and in the organization. The original design of the system may be faulty and not provide the functions the firm needs. Specifica tions may be incorrect or incomplete so an important action is not included in the system. Systems may not work technically; for example, there may be so many er rors that no one trusts the output from the system. The interface of the system with the users refers to the way in which we come in contact with the system, for example, through printed forms, terminals, or printed re ports. In one system, terminal input was so complicated that no one submitted data and the system had to be discontinued. Users may also be unhappy about the way designers went about developing the system: the process of design. For example, de signers sometimes make arbitrary design decisions and fail to consult relevant users. Finally, the operation of a system involves longer-term issues after a system is designed and installed. If the operations section of the information services
51 9
520
PART FOUR: SYSTEMS ANALYSIS AND DESIGN
TABLE 1 9· 1
SOME POTENTIAL SYSTEM PROBLEMS
The original design of the system The system will make substantial changes in the organization. All needed functions are not included. The database is incomplete. Procedures for processing information have errors. There are design errors, e.g., incorrect specifications. There are programming errors. The system has communications network problems. The interface of the system with users Input or output is difficult for the user to understand. Input screens are complex. The user has no incentive to provide input. Input devices do not work well, e.g., a defective wand cannot read a bar code. The work force has been inadequately trained to provide input. The system permits a large number of input errors. The process of design and implementation Users are not consulted on crucial design decisions. Users are not motivated to participate in design or use the system. The system attacks an uninteresting problem, one that is not crucial. Designers make arbitrary decisions that turn out not to work in practice. Users do not take time to participate when invited to do so. The design and programming process drags on for an inordinate amount of time. There are significant conversion problems due to poor planning. The operation of the system The system has bugs. Response time is inadequate. The system is frequently unavailable for long periods of time. The system is not backed up. The IS staff is not responsive when there are problems.
department does not provide good service (for example, having excessive re sponse time or downtime), systems will not achieve their potential. IMPLEMENTATION What Is Implementation?
Implementation is part of the process of designing a system and is a component of change. We develop a new information system to change existing information processing procedures and often to change the organization itself. Implementation refers to the design team's strategy and actions for seeing that a system is success ful and makes a contribution to the organization. Our definition stresses the long-term nature of implementation. It is part of a process that begins with the very first idea for a system and the changes it will bring. Implementation terminates when the system is successfully integrated with
CHAPTER 1 9: I M PLEMENTING CHANGE
the operations of the organization. We expect most of implementation to be con cerned with behavioral phenomena since people are expected to change their in formation processing activities. Implementation becomes more important and dif ficult as systems design becomes more radical. If a firm undertakes a maj or reengineering project, it should make major changes in tasks to reduce costs and improve productivity in the organization. Success or Failure
How do we know that we have successfully implemented a system? Researchers do not agree on an absolute indicator for successful implementation. One appealing approach is a costlbenefit study. In this evaluation, one totals the costs of develop ing a system and compares them with the dollar benefits resulting from the system. In theory, this sounds like a good indicator of success, but in practice it is difficult to provide meaningful estimates. Obtaining the cost side of the ratio is not too much of a problem if adequate records are kept during system development. However, an evaluation of the benefits of an information system has eluded most analysts. Chap ter 3 described a number of categories into which we might classify the benefits or value provided by an application of technology. These categories included: Infrastructure Required applications Applications where technology was the only solution Applications providing a direct return Applications with indirect returns Technology initiatives that are a competitive necessity Strategic applications Transformational information technology For only a few of these categories are we likely to be able to demonstrate a direct financial return, which makes it difficult to perform a costlbenefit analysis to de termine the "success" of a system. As an alternative, we can choose among several indicators of successful imple mentation for an individual application, depending on the type of system involved. In many instances, use of a system is voluntary. A manager or other user receives a report but does not have to use the information on it or even read the report. Sys tems that provide interactive retrieval of information from a database also can often be classified as voluntary. The use of such a system is frequently at the dis cretion of the user. A manager with a personal computer in his or her office is not required to use it. For the type of system in which use is voluntary, we shall adopt high levels of use as a sign of successful implementation. We can measure use by interviews with users, through questionnaires, or in some instances, by building a monitor into the system to record actual use. For systems whose use is mandatory, such as a production control system or a computer that provides stock market quotations for a broker, we shall employ the user's evaluation of the system as a measure of success. For example, one
521
522
PART FOUR: SYSTEMS ANALYSIS AND DESIGN
can examine user satisfaction, although it will probably be necessary to measure several facets of satisfaction, such as quality of service, timeliness and accuracy of information, and quality of the schedule for operations. An evaluation might also involve a panel of information processing experts reviewing the design and operation of the system. We should also note that managers might well consider a system to be successful if it accomplishes its objectives. However, to accom plish its objectives, a system must be used. We would also hope that one objec tive of a system would be extensive use and a high degree of user satisfaction. Finally, though it is difficult to do, we can try to estimate the impact of a system on individuals and the organization. How has a system affected personal produc tivity and output quality? Can the organization point to added sales or increased revenues from a competitive application? Can we show that IT has had an impact on performance, either for individuals or the organization? RESEARCH ON IMPLEMENTATION
Most research on implementation is an attempt to discover factors associated with success. What independent variables are related to successful implementation as defined by the researchers? If there is any basis for believing a causal connection
II We know that information technology can have a dramatic impact on thE! place and time of work. The invention of the electric elevator and the development of steel and reinforced concrete framing made possible m o d e r n h i g h - rise office b u i l d i n g s , the largest of which are classified as "skyscrap ers." These large buildings made it possible to house thousands of office workers i n close proximity t o each other s o they could interact easily. The buildings let workers ac cess central repositories of data while su pervisors could monitor work closely if they desired. The tallest buildings project a sense of wealth and power for their owners and in clude the Empire State Buildinll and World Trade Center in New York, the Sears Tower in Chicago, and the Petronas twin towers in Kuala Lumpur, Malaysia. There is even a committee to define what is to be measured
to determine building height (do you count the television towers on top?) and finally to rank the world's tallest buildings. Is the skyscraper obsolete? Information techn o l ogy accomplishes much of what these buildings do, though without projecting power and prestige. The Petronas Towers are 452 meters high, while Microsoft's head quarters in Redmond Washington is 20 me ters in height! Tall buildings have some un desirable side effects, including blocking sunlight and changing wind patterns (the canyons of lower Manhattan are one exam ple). In addition, they encourage commuting into the center of a city, something that cre ates significant pollution in most major cities. The rise of telecommuting, the easy accessi b i l ity of databanks from anyplace in the world, and electronic communications all sig nificantly reduce the appeal of the modern skyscraper as a place to work.
CHAPTER 1 9 : IMPLEMENTING CHANGE
exists between independent and dependent variables, we can develop an imple mentation strategy around the independent variables. For example, suppose we found in several studies using different research methodologies that top manage ment's requesting a new system and following through with participation in its de sign is associated with successful implementation. If there were sufficient evi dence to support this finding, we would develop an implementation strategy that emphasized top-management action. Although individual studies of implementation address a number of indepen dent variables, there is no real consensus in the field on an explanation of success ful implementation or on a single implementation strategy. Table 19-2 contains a list of some of the variables employed in past implementation studies. Dependent variables used to measure implementation success generally can be classified as measures of use, intended use, and/or satisfaction with a system. The independent variables fall into several classes, as shown in the table. A Model of Implementation
There have been a number of different studies of systems implementation, many of which are reviewed in Lucas, Ginzberg, and Schultz ( 1 99 1 ). In this study, the
TABLE 1 9· 2 VARIABLES ASSOCIATED WITH IMPLEMENTATION STUDIES
Independent variables Information services department Policies Systems design practices Operations policies Involvement User origination of systems I nvolvement and influence Appreciation User demographics Personality type Business history Social history Past experience
System characteristics Quality Ease of use Decision style Cognitive style Management Actions Support Managerial style Organization support Ease of access User performance
User's personal stake Problem urgency Dependent variables Implementation Frequency of inquiries Reported use Monitored frequency of use User satisfaction
523
524
PART FOUR: SYSTEMS ANALYSIS AND DESIGN
authors propose and test a model of implementation for system users. Figure 19-1 is a model based on the most significant findings from the research in the study discussed above. The model suggests that the user's personal stake in the prob lems addressed by the system will be an important determinant of use. Personal stake refers to how important the domain of the system is for the individual. A marketing manager is expected to have a high personal stake in a market re search system that addresses the brands she manages. Personal stake is hypothe sized to be influenced by the level of management support for a system. The most consistent finding across implementation studies is the importance of man agement support and leadership in successful implementation. Problem urgency is likely to influence personal stake. The more urgent the problem, the higher the personal stake. We expect personal stake to influence use directly, when use is voluntary. Sys tem characteristics will also influence use. A poorly designed system may be vir tually unusable. User demographics such as age and past computer experience are also likely to affect system use. Organizational support refers to actions that make a system easy to use. For example, we found that use of a system increases with the ease of accessing it. If a user must leave his or her office to find a PC, usage levels are lower than when a PC is located in the office. The model suggests that high levels of use should lead to high levels of satisfaction, and a high level of sat isfaction is likely to increase levels of use. Although the evidence is not strong, it does appear that use of technology is re lated to either individual or firm performance in certain instances. This relation ship is likely to be complex. For example, one study found that high-performing
FIGURE 1 9·1
An implementation model.
CHAPTER 1 9: I MPLEMENTING CHANGE
sales representatives used the output of a system to work with buyers in a store to figure out what to order. Low-performing sales representatives also used the out put of the system, but they focused on information that might indicate what was wrong in their territories. There are also a number of technology efforts where it appears a firm has reduced costs or increased revenues. However, it is hard to demonstrate causality in such situations because so many variables are changing at one time. The Implementation Process
The research described above deal:; with variables or factors associated with suc cessful implementation. There is also a school of thought that stresses the process of implementation as the most significant determinant of implementation success. The implementation process refers to the ongoing relationship among individuals involved in developing a system. A process model might look at various stages during implementation and describe how different parties work together during these stages. Our process model includes the stages outlined in Table 19-3. This model em phasizes tasks that take place in de1;ign. In reading between the lines, however, we can see the need to concentrate on the relationship between designers and users. During the early stages, the indivi duals involved with the system must develop trust in each other's objectives and competence. The designers should want to help users, and users must be willing to :,pend time working with designers and on their part of the design. If those involved do not develop a cooperative relationship and become adversarial, the system is doomed. A major objective during the de1;ign process is for users to accept ownership of the system. Professional designers, ironically, almost never use the systems they design! The user is left with a syst<;�m at the end of a project. If the user does not "own" the system from a psychological point of view, the system is unlikely to be successful. There has been some research to show that the termination stage in the model above is the most important. Here is where we learn if users have developed feelings of ownership and commitment to the system.
TABLE 1 9·3
A PROCESS IMPLEMENTATION M(�DEL
Stage
Activity
Initiation Exploration Commitment Design Testing Instaliation Termination Operations
The first contact between the users and designers Getting a feel for the problem Making a decision to proceed with a system Developing tile logical design and specifications for the system Verifying that the system works Converting to the new system Design team finished; users must now own the system Routine opera.tion plus enhancements and maintenance
525
526
PART FOUR: SYSTEMS ANALYSIS AND DESIGN
AN IMPLEMENTATION STRATEGY
We need an implementation strategy that takes into account the crucial process is sues in designing an information system as well as the factors that appear to influ ence success. We also view systems design as a planned change in activity in the organization. We stated earlier that the reason for developing a new information system is to create change. Dissatisfaction with a present situation stimulates the development of a new information system. Alternatively, a user sees how the tech nology can be used in a new way to improve the firm's competitive position. For many years, articles and books on design stressed user participation in the design process based on research in psychology that maintains that a change ap proach based on user participation is most likely to succeed. The first part of our strategy, then, is encouraging users to participate in and influence design. Some of the reasons for a participation strategy are: • •
•
•
Participation builds self-esteem, which results in more favorable attitudes. Participation can be challenging and intrinsically satisfying, leading to positive attitudes. Participation usually results in more commitment to change. In this case, com mitment means that a system will be used more. Participating users learn more about the change, and therefore get to control more of the technical qualities of the system and become better trained to use it.
CHAPTER 1 9: I MPLEMENTING CHANGE
• Technical quality will be better because participants know more about the prob lem domain than the IS staff. • Users retain much of the control over their activities and should therefore have more favorable attitudes.
How should users participate in the design of a system? Participation requires the efforts of both the IS staff and the users. The IS department has to encourage par ticipation, while users have to be willing to participate and devote considerable ef fort to design work. In the past, although most information services departments attempted to involve users, the effort frequently produced what would have to be classified as "pseudo-involvement." To bring about the necessary participation, it has been suggested that users actually design their own systems. The Role of Design Teams
Teams consisting of managers, end users, and systems professionals design most applications today. How do users and professional systems analysts work together on a team? The first task delineated by the analyst might be a discussion of the functions the system is to perform. Working together, the team might develop high-level data flow diagrams for the system. The analyst, from knowledge of the capabilities of technology, presents alternatives for the user to consider. Users help conduct interviews to determine the requirements for a new system. They also contribute to and review the design of the system as it unfolds. Users should have the final say in how the system will function. In this way, users be come knowledgeable about the system and develop ownership, one of the major objectives of the process model. An Implementation Framework
A team approach that stresses cooperation and participation addresses the issues raised in the process model of implementation, but what about the factors dis cussed earlier in the chapter? Our complete implementation strategy comes from merging the most important factors with the steps of the process model (see Table 1 9-4). The combined model in Table 19-4 arrays the steps of our process model with the variables from the factor model of Figure 19- 1 . During initiation, one key to success is having a sponsor or champion for the system. Without the active support of a senior-level person in the organization, the chances for success are greatly re duced. Similarly, the factor model suggests that attacking urgent problems is a good strategy. It is hard to develop enthusiasm for boring systems that are unlikely to have an impact on the firm. We should locate users with a stake in the problem and start to think about who the users will be when the system is done. User de mographics are not under our control in the short run. When we are exploring possible solutions, we need management support to provide resources. It is also useful to think in costlbenefit terms. Who pays the costs to use the system and who gains? If users are expected to provide complex
527
U'I I\) co
Choose among alternatives
Show how system is important to user
I nvolve the important stakeholders
Urgent problems help provide motivation
Dealing with key problems helps obtain cooperation
Urgent problems High stakes should lead demand quality to a lot of design input designs
Sponsor commits resources
Sponsor provides time for users to work on system
Sponsor helps make key policy decisions
Build the highest· quality system possible!
Develop prototypes to aid in design
Find users for Determine requirements whom the stakes are high and architecture
Attack the most important problems
System characteristics
Having a sponsor is key
User's personal stake
Problem urgency
Management support
AN IMPLEMENTATION MODEL
TABLE 1 9·4
Design to encourage use, e.g., good interfaces
Design
Who gains from use?
Commitment
Who pays the costs of use?
Exploration
Who will use the system?
Initiation
Use
Provide education where neededprototypes help
Look for users with successful history of working on IS projects
In longer term may be able to choose team members
Not under the control of designers
User demographics
Make the system as easy to use as possible
Get a commitment before starting
Be sure someone will provide the resources you need
Find the champions
Organization support
Performance
Design for satisfaction
Consider user surveys
Design for satisfaction
Try to understand what leads to performance, and design for it
Be honest about what to expect
Is there likely to be an impact on performance?
One objective is Determine any satisfied performance users objectives
Satisfaction
en � CD
Users with a high stake should plan installation
Stakeholders should own the system
A high-quality High-stake system is users should easy to use continue their interest
Plan installation to minimize disruptions
Is the problem solved?
Continue to work on problem
Sponsor provides added resources
Sponsor rewards team
Sponsor continues to provide resources
Transfer ownership to users
Use extensively
Test exhaustively
Let the stakeholder verify the results
Test carefully
Sponsor reviews results
System characteristics
User's personal stake
Problem urgency
Management support
Continue to refine to encourage use
Operations
If successful, expect high use
Termination
Expect and prepare for use problems
Installation
Make sure system is usable
Testing
Use
Even the skeptics will use a good system
With luck, there will be new supporters
Everyone will have to help
Let the worst critics help test
User demographics
Provide ongoing organizational support
Support users with help desks, etc.
Be sure there is enough support
Get resources for testing
Organization support
Install carefully if performance is an issue
Test carefully if system affects performance
Performance
Obtain ongoing feedback from users
Monitor performance changes
High satisfaction If successful, should lead user will use to user system to ownership enhance performance
Try to plan a smooth installation
Let users plan tests, too
Satisfaction
530
PART FOUR: SYSTEMS ANALYSIS AND DESIGN
input but receive no benefits from the system because the data are used only by senior management, there may be resistance to the system. During exploration we begin to see the architecture for the system and can determine what kind of organi zational support we need in order to encourage use. During the commitment stage, the sponsor has to prepare the organization for the design effort, often by providing release time and resources for the design team. One good way to enlist support and to show how the systems design effort will solve problems is to de velop a prototype of some or all parts of the system. We might also employ user surveys to gain information for design. During design, we need the sponsor to help make key policy decisions. For ex ample, if we are planning an EDI application, what is the target audience? How do we approach suppliers and customers? Will senior management negotiate with po tential EDI partners? Remember that we want to attack urgent and important prob lems. These problems demand a high-quality design that will encourage use. Testing is extremely important in preparing for installation. Management and as many users as possible should be involved in designing and verifying tests. Installation is difficult because any system is designed to change existing pro cedures. Because we want to tackle important problems, the risks are very high. A failed installation threatens some key component of the organization. We need careful testing, a good cutover plan, and a lot of help from users to succeed in installation. Termination marks the departure of the professional analysts and probably the completion of the design team's responsibilities. If the design team has been suc cessful, users will develop a sense of ownership of the system. The installed sys tem will help solve an urgent problem for user stakeholders, and the organization will provide adequate resources to support the system. Users will be satisfied with the resulting system. When the system is in operational status, it is not finished. As users work with the system, they will see ways to improve it. Business conditions are also likely to change, necessitating ongoing maintenance and enhancements. The organization must continue to support the system by expanding it as conditions warrant. The operations staff of the IS department must provide maintenance and should obtain periodic feedback from users. This combined implementation model is based on implementation research and experience. It can help develop systems that are successful and that will be used. The threats to a successful system are many and varied, as portrayed in Table 19-1. Following a conscious implementation strategy is the best way to maximize the probability of a successful design project. Some Examples
The procedures for systems design recommended above have been used for the de velopment of several successful information systems. In one instance, a feasibility study and systems design were carried out for a grass-roots labor organization. The design team consisted of union members, and faculty and students from a uni versity. The union members in general had a low level of formal education, and
CHAPTER 1 9: I MPLEMENTING CHANGE
the design team was concerned about the effect of computer technology on the union and its individual members. Because of hectic union organizing activities, the union staff could not devote the time needed to develop a system, although eventually several full-time union staff members began to work on the project. To begin the analysis, the university design team interviewed members of the union staff and gathered data on existing procedures and requirements. After jointly determining that a system was feasible, the design team developed a rough design. To turn ownership of the system over to the union and to be sure the union staff was in control of the system, a day-long review session was held to present the draft of the system. At this meeting, the union president explained to the members that there were many tasks to be done and that no one would be replaced by a computer. He stated that instead workers probably would have more interesting jobs, and he asked members to think about how the system could help the union. The design team began its part of the meeting by stressing that the session would be successful only if at least half of the system presented was changed: The team offered ideas, not a finished product. They did not use elaborate flow charts and visual aids. Instead, a very simple tutorial on computer systems began the presentation. The designers spoke from rough notes and listed report con tents, files, and inputs on a blackboard. The highly motivated union staff quickly grasped the relationships among reports, files, and input documents. Substantial changes to the rough system were made in front of the audience during the meeting.
531
532
PART FOUR: SYSTEMS ANALYSIS AND DESIGN
Several weeks later, a follow-up meeting was held with union leaders, who sug gested management-oriented reports. The design team helped the union develop specifications for bids and worked on a consulting basis with the union staff, which finally developed a system. The designers intentionally reduced their role as the union became more capable in the systems area. The system was successfully implemented. The level of use was high, and users, from the union president to clerical personnel, appeared pleased with the system. In another situation, a system was developed to support the decisions of a group of three managers. These managers were responsible for setting production sched ules in the commercial laundry products division of a major manufacturing com pany. The production manager wanted to minimize setups and have long produc tion runs. The marketing manager wanted to have wide product availability at warehouses throughout the country to provide high levels of customer service. The market planning manager had to resolve differences in objectives so the three managers could develop a feasible production plan. Because future production de pended on the decision for the next month, a 12-month planning horizon was used. In the original manual system, managers generated possible solutions analyzed by clerical personnel who performed a large number of manual calculations. On evaluation, it was usually found that a solution had to be modified because some part of it was infeasible. More meetings and more clerical computations were re quired. Sometimes almost the entire month elapsed before the next month's sched ule was ready. The research group trying to improve this decision process observed the man agers at work for some six months. After three months, a rough system featuring an interactive graphics display terminal was developed. The first prototype system was shown to the market planning manager, who learned how to operate it. This manager made many suggestions for changes, which the designers incorporated into the system. Then the market planning manager trained the production and marketing managers in the use of the system. They too had numerous suggestions for modifications, which were incorporated into the system. Over time, the re searchers modified the system for the managers in this particular decision situa tion. The managers were very satisfied with the system and resisted attempts by the information services department to discontinue it after the research project was officially completed. Emergent Change
The changes described above are all planned; managers determine in advance their objectives for change within the organization. However, individuals adapt technol ogy in a number of diverse and interesting ways, constituting emergent change (Orlikowski, 1 996). These kinds of changes occur in the absence of explicit inten tions and objectives for change. In fact, such changes cannot be anticipated in ad vance because people adapt to the technology as they use it. Such emergent change can be a very positive, unintended consequence of a new application. Zeta Corporation, a leading software vendor, installed Lotus Notes to support its customer services department (CSD). The 50 representatives in this department
CHAPTER 1 9: IMPLEMENTING CHANGE
answer phone inquiries from customers and try to solve the customer's problem. Notes is a groupware product that promotes sharing and coordination. Manage ment encouraged CSD representatives to enter all their calls, the nature of the problem, and information about the solution into the Notes database. CSD mem bers can access this database in a number of ways and can search it for past inci dents that are similar to the one they currently face. Within a year the database contained 35,000 entries of problems and their resolution. How did change emerge from this technology investment? First, CSD repre sentatives found a similar problem in the database for 50 percent of their calls; past solutions let them respond quickly with the correct answer to these cus tomers. With this level of access, the representatives quickly became highly de pendent on the database and technology. Management noted the change in the way representatives solved problems and reorganized the department into senior and junior representatives based on experience and expertise. The idea was that junior staff members would field all calls and pass the difficult ones on to the senior staff. However, junior representatives were not comfortable assigning problems to senior colleagues, so management created the role of an intermediary who would review problems and decide when they needed a referral to a senior representative. CSD employees noticed a decline in face-to-face contact and began to find rea sons to meet each other. Some of the representatives became proactive, looking for open problems in the database when they were not too busy. The company ex panded use of the system to two overseas offices, creating some problems at first when the foreign representatives did not completely understand the process for creating and using the database. As the groups adopted shared norms for the sys tem, however, the problems disappeared. When others in the company wanted access to the data, the CSD staff was con cerned since the database contained so many details. To solve this problem, non CSD employees were given access to "sanitized" reports. The CSD staff also began to publish technical notes for the company based on the database. Finally, Zeta used Notes to create a "bug" database to facilitate identifying and fixing problems with their products. This example of emergent change is very positive; CSD staff members found ways to integrate the Notes database with their jobs and to improve the quality of customer service. They expanded their use of technology to have a broader impact on Zeta than originally planned. In this case, information technology facilitated changes that emerged spontaneously from employees using the technology. You cannot plan for emergent change, but you can support and encourage it as changes become evident. IMPLEMENTING IT·BASED TRANSFORMATION OF THE ORGANIZATION
The discussion above focused on the changes caused by an individual system or a reengineering effort within the organization. How do you implement the massive changes required to use information technology to transform the organization and
533
534
PART FOUR: SYSTEMS ANALYSIS AND DESIGN
create new structures and relationships within the firm and with external organiza tions? Earlier we argued that the IT design variables presented in Chapter 4 could be used to create a new kind of structure: the T-Form organization. The advantages of this structure include: 1. A lean organization with the minimal number of employees necessary for the business to function 2. A responsive organization that reacts quickly to threats from competitors and changes in the environment 3. A minimum overhead organization 4. A structure with low fixed costs due to more virtual components, partnerships, and subcontracting 5. An organization that is responsive to customers and suppliers 6. An organization that is more competitive than firms with traditional structures 7. An organization that allows its employees to develop their capabilities and maximize their contribution to the firm
One of the major advantages of this kind of organization is its lack of a large number of hierarchical levels. The firm is flat with few levels of management. This organization is responsive because decisions are made quickly; large numbers of levels of managers do not slow decision making. All these features add up to lower overhead than the traditional bureaucratic organization. The end result should be a firm that is more competitive than a traditional hierarchical organization because of its responsiveness and lower operating costs. There are costs that go along with these benefits including: 1. The organization has to invest in information technology. 2. The firm has to be able to manage IT. 3. Employees have to learn new technologies and constantly update their knowledge. 4. Managers have a wide span of control. 5. Managers have to supervise remote workers. 6. Firms have to manage close relationships with partners and companies in vari ous alliances.
Another cost of using technology to transform the organization is learning new technology. Products and systems are constantly changing. New releases of PC software, like spreadsheet packages, seem to average more than one per year. If you do not upgrade and learn new systems, eventually it becomes difficult to share with others. And, of course, you forego the improvements in the new version of the packages. The T-Form organization features a wide span of control for most managers. The idea is to substitute electronic for face-to-face communications. Implicit in a wide span of control is a degree of trust in subordinates. Electronics will not substitute for the close control one can exercise over subordinates when a man ager has only five or six direct reports. A recent news story on Japanese manage ment showed a large number of workers arranged in two rows of desks, each
CHAPTER 1 9: I MPLEMENTING CHANGE
row facing the other. At the end of the row sat the workers' supervisor with his desk perpendicular to the workers so he had them under constant view. Evi dently a common feature of Japanese organizations, this physical structure is probably the ultimate in close supervision. The T-Form organization is at the op posite end of the spectrum. It requires managers to place more responsibility with subordinates to do their jobs. Closely related to the need to adopt a management philosophy stressing subor dinate responsibility is the problem of managing remote work. Companies are likely to eliminate physical offices for employees who spend a great deal of time traveling or who work from a satellite office or home. Work-at-home experiments have shown that some managers feel uncomfortable trying to supervise subordi nates they rarely see. Remote work also requires the manager to trust subordinates, and of course, requires subordinates to act responsibly. Some subordinates have reacted negatively to losing their offices and to using part of their homes as of fices. They feel the company is forcing its overhead costs onto them. Virtual of fices will undoubtedly call for new managerial skills and relationships between managers and the people reporting to them. The final management cost of a technology-based organization is handling rela tionships with external firms. These firms might be suppliers or customers, part ners in a strategic alliance, or governmental agencies. These partners are a vital part of your business, but they do not report to you. Managers have to manage a cooperative arrangement without having the usual "tools" given a manager such as reporting relationships and control over subordinates' salaries. Analyzing the Costs and Benefits of Change
When trying to implement something new, it is helpful to compare the costs and benefits as we have just done. Figure 19-2 contains a vertical line that represents an equilibrium in which costs and benefits balance each other. Moving the line to the right is progress toward the T-Form organization and moving it left is toward traditional hierarchical firms. The benefits of the T-Form organization are on the left pushing toward the right with the costs on the top of the right pushing left. When managers see the benefits exceeding the costs, they will move toward the T-Form. We would expect that the advantages of the T-Form for new organizations would far outweigh its costs because the T-Form fits start-ups very well. A number of Silicon Valley companies employ virtual components and electronic linking and are well along the way in using IT design variables. A company makes a scanning system and software that is aimed at eliminating paper in the office. Their corpo rate office in Palo Alto is responsible for design, marketing, and sales. Subcontrac tors manufacture the product: the circuit board comes from Singapore, and a Boston firm makes the case, tests the product, and ships it to customers. Other partners help write the software. Sales representatives in the field do not have physical offices but are linked by mail, voice mail, and cellular phones. What are the possibilities of moving more traditional firms toward the T-Form? In addition to the costs and benefits shown in Figure 19-2, there are additional
535
536
PART FOUR: SYSTEMS ANALYSIS AND DESIGN
Flexibility
�
Reduced bureaucracy Employees trusted
Wide span of control Need to trust
Flat organization
Need to manage IT
Low overhead
Need to manage remote
Efficient operations
work
Delegated decision making
�
Virtual components
Need to manage external partners Dependence on external
Highly competitive
partners
Personal support from IT Opportunities for employees Strategic alliances
�
External partners
Entrenched managers Tradition Vested interests Obsolete/mismanaged IT
TRADITIONAL ORGANIZATIONAL
�
�
TH E T-FORM ORGAN IZATION
FORMS
FIGURE
1 9·2
Forces for changing organization structure.
forces acting against the T-Form in hierarchical firms. These forces are "costs" to the current employees of the firm as the technology-based organization clearly threatens many vested interests. A minor restructuring of a department or work group will not let the firm enjoy the benefits of a new structure for the organiza tion. We are suggesting a massive change that includes all employees and units of the firm. You might start in one department or division, but as with other technolo gies we have seen, you need a critical mass. E-mail does not achieve its potential if only 50 percent of the firm use it. Customers may be happy to use EDI with one division, though they may wonder why the rest of the company does not offer electronic linkages. Massive changes are difficult to carry out since there are many forces acting against them. Major change programs create a number of threats to those already in the firm. The first of the threats is to the entrenched bureaucracy. Middle managers and others have proven very adept at protecting their jobs. As a result of many IT-stimulated restructurings, it is likely there will be fewer employees.
CHAPTER 1 9 : IM PLEMENTING CHANGE
The new organization structure will require the company to downsize. Clearly, downsizing is a threat to existing employees, and it is natural for them to oppose an organizational form that encourages a smaller firm. A manager committed to using IT design variables will also ask fundamental questions about all the tasks performed in the organization. Should we continue to operate a transportation system, or should we contract with outside carriers? Should we eliminate all forms of payment except credit cards and do away with the accounts receivable department? Should we contract out our IS operations? The threat of any of these partnerships or alliances is certain to arouse resistance on the part of current employees. Motivating Organizational Change
Figure 19-2 also shows the addition of these "costs" that help to maintain the sta tus quo, traditional organization. In fact, the costlbenefit assessment in Figure 19-2 is a helpful tool in understanding all kinds of change efforts. It will be very difficult in many traditional firms to create movement toward the T-Form organization. What might motivate such a firm to change structures? 1. 2. 3. 4. 5.
A merger or acquisition A major crisis, e.g. substantial losses Bankruptcy Rebellion by the board of directors Legal or regulatory reversal
Mergers and acquisitions often result in new management teams. New man agers might look at the firm and realize that integration of the two companies pro vides a good opportunity to develop a new overall structure. Unfortunately, some times it takes a major crisis to motivate managers. We might include a rebellion by the board of directors here as well. The chairmen of companies with significant problems have been asked to resign in record numbers in the last few years. Pow erful chairmen at IBM, DEC, Westinghouse, and GM among others have suffered this fate. Being a new manager in a crisis situation provides a certain amount of leverage for changing the organization. Bankruptcy is a traumatic event that may well provide the opportunity for a dramatic restructuring of a firm. Unfortunately, the bankrupt firm is at a bit of a disadvantage with efforts to partner and form alliances given the history that put it into bankruptcy in the first place. It may also lack the funds necessary to develop a technological infrastructure. Finally, a legal or regulatory reversal may also pro vide the motivation for a firm to use IT design variablles to come up with a new structure. It appears that a crisis may be the strongest motivation for reorganization. Pos sibly the second reason is the competition. If a firm sees the competition per forming significantly better after adopting a new structure, it may imitate the competitor.
537
538
PART FOUR: SYSTEMS ANALYSIS AND DESIGN
A The futures exchanges are going electronic, ending the open-outcry system of trading. The Chicago Board of Trade, the world's largest futures exchange, is preparing for electronic trading around the clock. The CBOT will continue to use the open-outcry system on its floor but will be ready if cus tomers demand electronic trading. Efforts are under way to develop software to handle d ifficult t rades l i ke options trad i n g and spread trades. E u ropeans are movi n g quickly t o e lectronics. Deutsche Termin boursre, or DTB, gained market share in trading German government 1 0-year-bond futures away from a rival exchange in Lon don because of DTB's user-friendly auto mated trading platform. The London I nterna tional F i nancial Futu res and Options Exchange is now rushing to develop its own electronic trading system. The Paris deriva tive exchange introduced electronic trading
alongside open-outcry operations. Soon floor trading disappeared, and the exchange closed the floor. Electronic markets make it easy to trade in different places. The CBOT, DTB, and the Swiss Options and Financial Futures Exchange will all trade products on each other's system s , expa n d i n g t h e choices for customers. Imagine the implementation issues with these e l ectro n i c trad i n g systems. Cus tomers must learn new ways of using tech nology, but experience indicates that they learn quickly. The more difficult problem is what becomes of the floor trader when there is no more floor? Open outcry brokers do not want to see the end of the physical ex change, and they are likely to resist elec tronic markets. Competition, however, with exchanges that have adopted electronic training is a powerful impetus for implement ing electronic exchanges.
A Change Program
How should a manager go about trying to create a T-Form organization? You are trying to move the organization from one state, say a traditional, hierarchical orga nization, to another, the T-Form. Change is one of the most difficult things to bring about; our discussion earlier in the chapter has pointed out a number of forces act ing against the manager who wishes to change a firm's structure. Figure 19-2 can be thought of as a force field as it shows the forces acting for and against change. To bring about change, the manager can either increase the forces for change and/or decrease the forces opposing change. We suggest some approaches to strengthening the forces for change, but each or ganization is different and a change program must be custom tailored. Table 19-5 describes the key steps and some recommended actions. It is based on some of the ideas of Nadler and Tushman (1988). The first step is to motivate the change. We have suggested some crises that may provide enough motivation for action. There may be some less dramatic events that convince everyone change is needed. It is helpful here to have broad support from the board of directors and others with influence in the firm. Having a plan for the transition to a new organizational form is very impor tant since it provides a roadmap for action and keeps employees aware of what
CHAPTER 1 9: IMPLEMENTING CHANGE
TABLE 1 9·5
'
MOVING TOWARD THE T·FORM ORGANIZATION
Step
Action
Motivate the change
Explain reasons such as competition and falling sales; look for broad support from places like the board; communicate with everyone in the organization
Develop a transition plan
Use a task force to develop the vision for the new organization; describe steps that must be taken to reach a new organizational structure; take full advantage of IT design variables
Accumulate power and resources
Obtain support from key individuals and groups in the organization; be sure you have the influence and resources to bring about change
Manage anxiety
Communicate with employees; consider a groupware rumor mill application; provide outplacement and counseling; involve employees in designing the new organization
Build IT capabilities
Technology must be in place to enable the T·Form; there is often a lead time for implementing IT before you can make changes in the organization
is happening. Task forces for developing the plan are a good way to bring em· ployees into this process and tap their knowledge for building the new organiza tion. The results of the task force should be widely disseminated. Be sure to take maximum advantage of the IT design variables discussed in Chapter 4. Employees will experience much anxiety with just the suggestion of a change in the status quo that could alter their jobs or eliminate them. Nadler and Tushman suggest that one job for management is to manage anxiety in the change process. Involving workers is one way to reduce, but not eliminate anxiety. Individuals will be aware of the company's plans, but they may also see changes that look very threatening to them. On balance, it is a good idea to stress open communications rather than keep plans secret. In today's business environment, a responsible firm will also provide counseling and outplacement services for employees who are no longer needed. Making the transition to a technology-based organization requires that the firm have adequate technology in place. You may develop the capabilities needed in house, or you may turn to outside vendors. At a minimum you need a communica tions network and e-mail. Depending on your business, you need electronic connec tions to buyers and suppliers. Some of these links can be "purchased" through value added carriers and other service companies. Workstations in offices and networks connecting them are important. Increasingly, it appears that groupware like Lotus Notes (discussed in Chapter 21) and the Internet will become important ways of managing within the organization and a mechanism for linking to external partners. The task here is to design the firm's technology so it will enable, not constrain, its ability to move toward a T-Form organization. Once the technology is in place,
539
540
PART FOUR: SYSTEMS ANALYSIS AND DESIGN
the IT design variables can be used to develop the structure of the organization. Below are some questions to help you use IT variables in the design. It is impor tant to recognize that each organization will develop its own unique structure. 1. What are the most significant processes in our organization, e.g., order fulfill ment, manufacturing, etc.? a. To what extent should these processes be redesigned? b. What opportunities do new technologies and IT design variables offer for improving these business processes? 2. Who are our major partners, including customers, suppliers, and others (banks, accountants, and law firms, among others)? a. What opportunities are there for electronic linking and communications with these organizations? b. Where should we try to establish electronic customer/supplier relationships? c. What additional services can these partners provide? What opportunities are there to create virtual components? 3. How should we structure our strategic organization-by product, region, or a combination of factors? 4. What is our competitive strategy? How do IT design variables help us imple ment this strategy? 5. Given the major processes in our business, how do we assign personnel to be sure these processes are accomplished? a. Can we use technological leveling to minimize the number of layers in the organization? b. Do production automation and electronic work flows have something to contribute to our business processes? 6. What kind of managerial hierarchy is necessary? a. Can we use technological leveling to reduce layers and broaden the span of control for managers? b. Can we use technological matrixing to form temporary task forces and work groups instead of establishing permanent departments and reporting relationships?
The overall objective is to create an organization with a flat structure, flexi bility, responsiveness, decentralized decision making, effective communica tions, links to business partners, and the other characteristics of the T-Form structure. We think that the major challenge facing managers in the twenty-first century will be to design organizations that take advantage of the IT design variables discussed here. Moving toward the T-Form organization requires new ways of thinking for the start-up organizations and massive changes for traditional or ganizations. Senior managers must decide if the benefits we claim for this kind of organization are sufficiently compelling to confront the perils of changing the organization.
CHAPTER 1 9: IMPLEMENTING CHANGE
BEYOND STRUCTURAL CHANGE
How do we bring about changes in interorganizational relations, the economy, ed ucation and national development with the help of new technologies? We have seen in our discussion of the impact of IT how firms use electronic communica tions and linking to change interorganizational relationships. Since these changes generally involve individuals who are not part of your organization, how do they occur? The implementation framework shown in Table 1 9-4 has a column for Management Support; in this column we mention having a sponsor or champion. This individual is at a senior level of management and provides the leadership nec essary to create change. For developing new interorganizational relationships, you need such a champion to initiative ideas, meet with managers of the other organi zations involved, and obtain support in your own organization for the change. How does information technology facilitate changes in education or national development? Here again, a sponsor or champion is important for change. Since these kinds of changes take place in a political arena, they are highly uncertain and probably irrational. Changes at the national level involve multiple constituencies, competing political philosophies, and different personal objectives. The force field analysis shown in Figure 19-2 can provide a number of insights to help the spon sor identify various constituencies and the forces leading to their positions. Changes enabled by technology at the level of the economy reflect all the other changes we have discussed. These changes will be emergent rather than planned. In recent years the U.S. has experienced steady levels of economic growth, low in flation, low interest rates, and high levels of employment. Classic macroeconom ics suggests that this combination is unlikely to occur. One explanation, without much data to support it, is that information technology has finally led to increases in productivity, which allow for modest wage gains without inflation. If this obser vation is true, then overall productivity gains are emerging from the individual change efforts of thousands of firms in the economy.
CHAPTER SUMMARY
1. Implementation is a change process that is designed to alter existing practice. With information technology, we make changes through individual applica tions and by using IT variables to redesign the organization. 2. The ability to use IT to change procedures and organizations themselves is one of the most exciting parts of technology. With IT, a manager can make a difference in how an organization functions and in its chances for success. 3. There has been a great deal of research on the implementation of individual systems, but it is still too often the case that new applications fail completely or fail to achieve their potential. 4. The chapter reviews factors thought to be related to successful implementation and a process model for the stages of systems development and implementation.
541
542
PART FOUR: SYSTEMS ANALYSIS AND DESIGN
5. Table 1 9-4 combines the factor and process models to provide guidelines for improving the chance of successful implementation for an individual applica tion of the technology. 6. The chapter recommends a high level of user involvement and influence in the design of a system for a number of reasons, including the psychological com mitment that involvement helps create and the knowledge that a user brings to the design project. 7. It is important to transfer psychological ownership of a system to the users of the application. S. Emergent change is unanticipated; it emerges from individuals who adapt the technology and use it to change the way they work. 9. The problems of implementing change are multiplied when the change target is the entire organization. 10. IT organization design variables are some of the most exciting contributions of the technology; however, using these variables to adopt a new design like the T-Form organization is a formidable challenge. 11. A force field analysis of the forces encouraging and inhibiting change can help to plan for a new organization structure. 12. It will in general be easier to use IT design variables when creating a new firm than when trying to change the structure of an existing one. 13. The motivation for a traditional organization to adopt a technology-based structure is likely to come from a crisis or from seeing competitors become T-Form converts. 14. IT also enables changes in interorganizational relations, the economy, educa tion, and national development. 15. Change is one of the most difficult assignments, but it is through change that management assures organizations will survive and flourish in the future. IMPLICATIONS FOR MANAGEMENT
Implementation of change is clearly a management responsibility. Managers should constantly be looking for improvement projects, ways to operate more effi ciently and effectively. The hardest part of this assignment is implementation seeing that changes occur in the organization. If you look at stories about success ful managers, they usually have brought significant change to their organizations. This is particularly true for "turn around" situations in which the manager rescued a sinking company. As a manager, you will find change one of your most challeng ing and frustrating tasks. KEY WORDS
Champion Change Commitment Demographics
CHAPTER 19: I MPLEMENTING CHANGE
Design Emergent change Exploration Force field Implementation Initiation Installation IT design variables Lean organization Operations Responsive organization Termination Testing RECOMMENDED READING Lucas, H. C., Ir. The T-Form Organization: Using Technology to Design Organizations for the 21st Century. San Francisco: Iossey-Bass, 1996. (A book devoted to the design of technology-based organizations.) Lucas, H. C. Ir.; M. Ginzberg; and R. Schultz. Implementing Information Systems: Testing a Structural Model. Norwood, NI: Ablex, 1 99 1 . (Presents a review of implementation literature and a new framework for approaching implementation.) Nadler, D.; and M. Tushman. Strategic Organization Design. New York: HarperCollins, 1988. (An excellent book on traditional approaches to organization design.) Orlikowski, W. "Improvising Organizational Transformation Over Time: A Situated Change Perspective," Information Systems Research. 7, no. 1 (March 1996), pp. 63-92 (A well-written article that provides many insights on emergent change.)
DISCUSSION QUESTIONS 1. Why is implementation more than just the last few weeks of the systems life cycle? 2. What definitions and measures of successful implementation can you suggest other
than the ones discussed in this chapter? 3. What are the responsibilities of users in the systems design process? 4. How do the responsibilities of managers differ from those of other users during systems
design? 5. What are the crucial differences between an internal infonnation system and an inter
organizational one from the standpoint of implementation? What are the key similarities? 6. What is the role of a consultant in helping to design information systems? How does
this role change under the systems design policies suggested in this chapter? 7. What approaches are there to evaluating the benefits of infonnation systems? 8. How would you measure the impact of an infonnation system on decision making? 9. What factors mitigate against massive change in the organization? 10. What might motivate a finn to use IT design variables to make a radical change in its
structure? 11. What problems does user-oriented design create for users, their management, and the
IS department?
543
544
PART FOUR: SYSTEMS ANALYSIS AND DESIGN
12. Can user-oriented design work for a system encompassing large numbers of people, for
example, a reservation system involving hundreds or thousands of agents? What strat egy could be adopted in this situation? 13. What are the advantages of an organization with a wide span of control? What are the disadvantages? 14. How does IT enable change in the economy? 15. What implementation strategy does the process model suggest? 16. Why do some authors think the hierarchical organization is doomed in the twenty-first century? What are the advantages of a flat organization structure? 17. How can information technology make major changes in education? 18. As a potential or present user of information systems, how do you respond to the idea of being in charge of the design of such a system? 19. Why should we be interested in the relationships among system use, user satisfaction, and performance? 20. Are the techniques suggested here applicable in other contexts? What situations can you suggest in which user control might be more successful than control by a group of technological experts? 21. How can you transform a huge firm like General Motors with the help of information technology? 22. When does planning for successful implementation begin in designing an information system? 23. What is the role of the technological infrastructure in moving toward the T-Form organization? 24. How does information technology affect national development?
CHAPTER 1 9 PROJECT
A Systems S u rvey In any organization, you will observe large differences in the extent to which indi viduals use information systems. Find an organization that will allow you to con duct research, for example, a place where you once worked, a university, or some public agency. Develop a series of interview questions about the kind of systems available to members of the organization, ranging from administrative systems to the personal support provided by pes. When you have interviewed 10 to 15 members of the organization, see if you can diagnose why there are wide-scale differences in system use. What points do your findings suggest for systems designers? For management? What kind of im plementation strategy can you recommend?
546
PART FIVE
I I
I
I
This part of the text explores recent trends in information technology.
Of
particular interest is supporting users who work with technology. Most pro fessionals today, and practically all in the future, will have a workstation on their desk. They will be connected to a network and will access various computers and databases over the net. Decision-support systems are an exciting way to use information tech nology. These applications help managers make decisions. A decision support system does far more than just process transactions. Technology is increasingly used to support individuals and work groups in their tasks. Groupware has the potential to dramatically change the way firms are structured and the way co-workers interact. In this part we also explore multimedia and look at the various purposes for this technology. Intelligent systems represent an applied area within artificial intelli gence. These systems capture the expertise of an individual or group of in dividuals and make it widely available throughout an organization. Intelli gent systems have a great deal of potential for applying the technology in a way that is quite different from traditional data manipulation.
547
CHAPTER 20
pp
I
I
1m
Outline The Range of User Activities Will Knowledge Workers Design the Entire System? Supporting Knowledge Workers The Data Warehouse
Policy Issues for Management Support Making Mistakes Standards Data Access Is Computing the Right Use of Time?
Benefits from Encouraging Knowledge Workers
Focus on Change
Users with their workstations, especially those connected to Intranets and the In ternet, are changing the natnre of the organization. Individuals within and external to the firm are connected to each other, making it possible to restructnre work groups and form alliances with outside organizations. Applications built around groupware, discussed in Chapter 2 1 , can create a knowledge base for the organiza tion. How much enconragement should you provide for your colleagues to become involved with and use the technology? •
549
550
PART FIVE: EXCITING DI RECTIONS IN SYSTEMS
In the 1980s a phenomenon known as end-user computing grew out of frustra tion. Users found that it took an inordinate amount of time for the information services department to process requests for changes to existing applications, such as the creation of a new report. Why does it take so long for a simple request to be completed? The IS department has limited resources. Analysts and programmers can work on new applications or they can be assigned to maintenance. It is the maintenance staff that generally handles requests for enhancements like new reports. Since most IS managers feel they are understaffed and because management's focus is often on new applications, maintenance and enhancements sometimes get a low priority. IBM of Canada conducted an experiment to see if it could satisfy more of its internal users. This company set up something called an information center, a room staffed with terminals and consultants to help users become familiar with technology. The center helped end users work with high-level languages so they could retrieve data from the company's computers and prepare their own reports with that data. This effort was the beginning of attempts to support end-user computing. Who, then, was the user? This individual is generally considered a nonprofes sional in the systems field. He or she has a different function from information systems; for example, a user may be a professional in finance, accounting, or pro duction. A more appropriate term might be "knowledge worker." Today, with the prevalence desktop computing and client-server architectures, the term "end user" is outdated. It is clear that most of us are users of the technol ogy in some way. The question is, what do we want to encourage users to do with IT and how do we support their efforts? THE RANGE OF USER ACTIVITIES
Table 20-1 shows the different ways users are involved in computing. For the most part, knowledge workers use personal computers and networks, often accessing data on file servers and/or mainframe computers. The user might begin working with a system like a spreadsheet package. The vast majority of spreadsheets are created by users rather than some intermediary. Users also tend to develop their own graphics for presentations. Knowledge workers may define their own data base using a program like Microsoft Access. However, the user may also let a pro fessional set up the application and only perform queries on the database. Companies with Intranets encourage users to publish material on their inter nal Web. Firms also have "Extranets," Web pages that external organizations ac cess, for example, to order products and services. The large number of HTML editors and Web page development products encourages all of us to become Web publishers. The components of Microsoft's Office suite can save their output as HTML documents to be posted to pages accessible through an Intra- or Extranet. More advanced development tools like FrontPage encourage you to design all or
CHAPTER 20: SUPPORTING KNOWLEDGE WORKERS
TABLE 20·1
USER·COMPUTING ALTERNATIVES
Packaged applications Spreadsheets Database management systems Presentation graphics Special-purpose languages, e.g., SAS, SPSS Web/lnternet applications Publishing documents with HTML editors, dElVelopment tools Creating Web pages with tools like FrontPage Building Net applications Query languages Database query facilities Development tools Visual Basic PowerBuilder DBMS development languages Object-oriented languages
part of a Web site. Web development tools may be the invention that lets knowl edge workers develop applications that large numbers of people access through the Internet. Queries on a PC can be done with the query processor that comes as a part of the database management systems described above. Products like Access let you save a query for reuse. With more effort you can develop an application using macros and Visual Basic, though at some point you will probably want to refer the development to a professional staff member. The fourth maj or category in Table 20- 1 describes systems-building tools. There are varying levels of sophistication among users. Some want to build com plete systems and others do not. As we have seen in earlier chapters, defining and constructing an application of information technology is a time-consuming, labor-intensive task. However, there are probably small applications you will want to develop yourself. There are many tools for building PC-based systems, including languages like Visual Basic. This language facilitates the construction of an application that will run under Windows. However, you are getting heavily into programming if you select this alternative. Other options for developing custom applications include a PC database man agement system. These systems make it possible to define input screens and out put reports, and to link different relations in the database. Although they are not as difficult to use as a general-purpose programming language, it would still take considerable effort for you to develop a system using one of them. In the future, we hope that object-oriented programming will develop so you simply have to point to various icons on a screen with a cursor, click a mouse key, and assemble the icons into a program. We are not quite there yet, however.
551
552
PART FIVE: EXCITING DI RECTIONS IN SYSTEMS
In an earlier sidebar, we talked about help ing the farmer improve the efficiency of his or her operations. Technology can also do something for the cowboy who carries a lap top. Currently about half of the over 9 million dairy cows in the U.S. are monitored elec tronically. The next frontier is to monitor beef cattle to improve the quality of meat. In addi tion to ropes and chaps, a cowboy may carry a scanner to collect data from an electronic ear tag on a steer. The user downloads the data to a laptop to see each cow's family and medical history. There are an estimated 88 million beef cattle in the U.S. The difference between a steer that yields prime cuts and one that produces mostly g round chuck is about $300. The objective is to learn what feed and other characteristics produce the kind of cuts for which Americans are willing to pay a premium. As we have become more health conscious, meat consumption has decl i n ed . G rowers want to satisfy cus tomers with prime cuts of leaner, more healthy meat. The cattle industry gener ates $50 billion a year in sales at the retail level.
Feedlots can use ear tags to trip sensors that record how often and how much a cow eats. They may also use ultrasound to deter mine the leanness and marbling of meat. If an animal is getting too fat, the grower can reduce its feed, saving money i n the process. Information on the kind and quality of beef is also being sent back to the farms where calves are born and raised to improve breeding programs. Veterinarians scan the tags to record the immunizations and medi cines the cow receives. Dairy cows have been monitored for a number of years. Sensors on milking equip ment note when a tagged cow enters the milking area and is attached to a machine. D u r i n g m i l k i n g the senso rs record how much milk the cow produces, its fat content, and the milk's white blood cell count, which indicates the cow's health. A third of dairy farmers t r a n s m i t t h e i r i nformation by modem to the Department of Agriculture in Maryland where it is compiled and ana lyzed. The results are returned to the farm ers to help them improve their operations. Where will this kind of technology turn up next?
Will Knowledge Workers Design the Entire System?
The unanswered question about computing is exactly how much responsibility do users want? Will they want to do more than use a PC package? Will we find that in 10 years, there will be no more systems analysts and programmers, only users who work on computers? It is unlikely that knowledge workers will want to develop large multiuser systems because of the considerable amount of time required. Also, when one moves from defining reports to database design, communications networks, and so on, the average user does not have the expertise required to develop a major application. You may, however, want to develop a simple application for colleagues in your department. The tools described above offer some alternative approaches. You will probably need some kind of consulting help to complete such an application. One approach to providing this consulting is to recruit "power users" from within the
CHAPTER 20: SUPPORTING KNOWLEDGE WORKERS
organization. As development tools improve, you will be able to accomplish a great deal in a "part-time" systems-building effort. Supporting Knowledge Workers
Computing cannot be the sole responsibility of the user; there must be support. The information services staff should help select the needed tools and systems, and provide adequate training. IS staff members should provide ongoing help about the systems and languages with which users are working. The IS staff should help the user locate data, and they may need to write programs to collect data from different files or process these data in some way before the end user can access them. The term "user services" has become popular for describing a support group for users. Consultants in the group have a number of duties: • • • • •
Solving immediate problems for users on the telephone or through e-mail. Teaching courses about available computers and software packages Consulting on the use of packages and languages Providing assistance in deciding on the acquisition of computers and peripherals Helping users by extracting, merging, and reformatting data on company data bases, and making the data available in a file for easy access by users
The consultant aids the user, answers questions, and provides help in accessing data. The user determines the data needed and creates the program to process the data. Information centers are transforming themselves to focus more on departmental needs and solving business problems as opposed to teaching people how to use computers or specific packages. The information center needs to be a consultant for the user who wants to develop applications and solve problems. The Data Warehouse
One strategy adopted by companies in which many users primarily want to ac cess data on corporate files is to create a user database. The data warehouse con tains data of interest to users in a format that is easily accessible to them (see Chapter l O). Users working on their own PCs access these multidimensional file structures to answer their questions. In a client-server environment, the user will access corporate data by making requests of the server for information that will be transmitted to his or her local workstation. The success of the data utility de pends on choosing the right information from the main corporate database and making it available on the user's computer. A data warehouse is very appealing for users as they can finally access data they know is available! POLICY ISSUES FOR MANAGEMENT Support
One policy question for the information services department is how many resources should be devoted to supporting users. A more difficult problem is controlling the
553
554
PART FIVE: EXCITING DIRECTIONS I N SYSTEMS
proliferation of hardware and software. Users conducting their own research may come up with a number of different approaches. Each new system, whether hard ware or software, requires the IS staff to learn how to support it. Such an effort is costly and time consuming. Thus, information services, with support from senior management, may establish a policy that all software and hardware be purchased through and with the approval of the IS department. Then the IS staff can evaluate the systems recommended and allocate staff members to become familiar with them. The IS department can keep control so that a reasonable number of different systems are acquired. Making Mistakes
There are many examples of users making costly mistakes doing their own com puting. Knowledge workers are not systems professionals, and they may not de velop adequate test programs. One construction firm actually sued Lotus (the suit was dismissed) because a user included a new item in a bid but failed to include that new item in the final summation of all costs. As a result, the bid was too low and the contractor lost money. If management gives users the freedom to develop applications, it needs to pro vide some guidelines and training on how to do it. Management should also expect
CHAPTER 20: SUPPORTING KNOWLEDGE WORKERS
mistakes and react accordingly. For example, you might want to have crucial num bers checked by another user, or even by a separate system. It never hurts to use a calculator to check a spreadsheet, or to try a new database application to see if you can make it fail! Standards
As users acquire local computers, the information services department will have to coordinate acquisitions. Various pieces of hardware will probably be linked in some kind of network. Compatibility among the different devices is of concern here. Again, IPultiple hardware vendors and different types of software place a heavy support burden on the computer staff. On the other hand, users often develop their own applications to avoid the controls and perceived unresponsiveness of a central IS group. Senior manage ment may well see the need for hardware and software standards, but it should also realize that users need some freedom if they are to do some of their own computing. Data Access
The user is, by definition, not a systems professional. For most applications, the IS staff allows access to data under its control but will not allow users to change these data. The systems professional must be · concerned about error checking, editing, data validation, and protection of the integrity of the database. There is no reason to suspect that the user is necessarily aware of this aspect of systems operation. The consulting staff can raise some of the issues discussed above, particularly when users develop local self-contained applications. For corporate data entrusted to the information services department, however, the staff will have to establish controls on data access and updating. Is Computing the Right Use of Time?
How much should knowledge workers do in developing technology? One senior manager does not want executives writing programs. He insists that programs be written exclusively by professional programmers; their salaries are much lower than those of senior executives. But what is most productive? What is a program? If a manager constructs a balance sheet using a spreadsheet package on a personal computer, is that programming? Is the use of a DBMS to define a personal application considered programming? Is publishing a report on a Web page programming? One answer is for you to become very facile in the use of these tools so that you will not spend an excessive amount of time using them. If it is possible to do so, developing your own personal application can be fast and should result in a system that meets user requirements. Earlier we mentioned an Andersen Consulting sur vey that indicated 8 1 percent of the senior managers queried were using personal computers. It is unlikely that these managers will discourage others from doing the same thing!
555
556
PART FIVE: EXCITING D IRECTIONS IN SYSTEMS
BENEFITS FROM ENCOURAGING KNOWLEDGE WORKERS
Knowledge workers have already discovered the benefits of user computing. They are using personal computers and packages with great enthusiasm. Knowledge workers are demanding tools they can use to solve their own problems. To some extent, the in formation services department has lost the initiative. To regain it and see that the sys tems effort is coordinated, and also to avoid duplication and waste, the IS staff need to establish a hardware and software architecture and a support mechanism for users. Encouraging users to solve some of their own problems is another way to reduce the time required to develop an application. This approach provides immediate feed back. The user becomes the designer of the system. This strategy also adds to the total number of persons working to solve systems problems. By increasing the number of individuals brought to bear on the problem, the backlog of systems work should be reduced. Users can reduce the length of time they have to wait for an application. CHAPTER SUMMARY 1. You are a likely candidate to solve problems using information technology,
probably a personal computer. 2. A key management issue is how much time knowledge workers should take from their normal activities to devote to systems development. 3. Management also has to worry about supporting users. Information centers, data warehouses, and user training are not free. 4. The benefits from encouraging knowledge workers to solve problems can be substantial if management supports them. Knowledge workers can cut the waiting time for information, and they can develop simple systems and reports without involving a systems professional. 5. The user can accomplish a great deal from his or her workstation, given tools and support. The user, rather than the systems professional, is in control of computing. 6. As a manager, you have to decide how much technology you will use and also how to use it yourself, and you must provide guidelines for those work ing for you. 7. It is clear that users are constantly doing more of their own development. 8. It is also clear that, despite the attractive interfaces of personal computers and windowing software, information technology is becoming increasingly com plex. We expect there will continue to be a need for professionals to develop the IT infrastructure and multiuser applications critical to the organization. IMPLICATIONS FOR MANAGEMENT
Different managers have quite different views on how much time they want their subordinates to spend developing applications for their own use. How do you know when the user has exceeded his or her knowledge? When do you call in the professional? It is safe to say that users have done and over time will be doing
CHAPTER 20: SUPPORTING KNOWLEDGE WORKERS
more development as the number of computers expands and software becomes more powerful. You will have to make the difficult decision on how the people working for you should spend their time. If you feel they should develop their own applications, then think of ways to support them with educational programs and consulting help when needed. KEY WORDS
Compatibility Control Database management system (DBMS) Data warehouse Extranet Fourth-generation language Information center Intranet RECOMMENDED READING McNurlin, B . ; and R Sprague. Information Systems Management in Practice. 4th ed. En glewood Cliffs, NJ: Prentice-Hall, 1998. (An excellent book with much material on sup porting users.) Mirani, R; and W. King. "The Development of a Measure for End-User Computing Sup port," Decision Sciences. 25, no. 4 (1995), pp. 481-497. (This paper describes the de velopment of an instrument to measure support for users; the categories into which vari ous items group are very interesting for a manager who wishes to encourage users to work with IT.)
DISCUSSION QUESTIONS 1 . Why is everyone computing today? 2. What are the advantages of users solving their own problems? Should management en-
courage it? 3. What is an information center? 4. What kind of support is needed for knowledge workers? 5. What is a data warehouse? 6. How much programming should users actually do? 7. How do modern tools make it difficult to define what is programming and what is
using a package? 8. Why has the use of IT by individuals accelerated in the past few years? 9. Why is a query language alone not sufficient for users to access their data? 10. How does having users solve some of their own problems affect the traditional role of
the systems analyst and programmer? 11. Will more user development eventually eliminate the need for professional systems an
alysts and programmers? 12. What is the impact of client-server architectures on knowledge workers?
557
558
PART FIVE: EXCITING DI RECTIONS IN SYSTEMS
13. What guidelines would you give your subordinates about the extent to which they
should develop applications for their own use? 14. What is the potential of Intranets and Web publishing in developing applications? 15. How can a manager encourage users to become more involved in systems design? 16. With what kind of project or at what point in time should a user call in a systems pro
fessional rather than undertake a project himself or herself?
CHAPTER 20 PROJECT
A Help Desk Knowledge workers need help ! Users are working with more desktop packages and more complex software all the time. Because the knowledge worker is in volved in a range of activities, using a workstation constitutes only a part of his or her tasks. This individual may become quite competent at using desktop software and even accessing data on corporate databases over a network. However, this worker at some point will exhaust his or her knowledge of the technology and will need help. If management wants to support knowledge workers, it will provide consultants or a "help desk." IT staff members working at the help desk answer phone calls and provide ad vice. We saw the example in Chapter 1 9 of Zeta Corporation's use of groupware to enhance the performance of a help desk for external customers. For this project, design a database to log help requests from users in the organization. How might you search this database to find answers to frequently asked questions? What use might you make of a corporate Intranet as a way to help users while reducing the workload on the help desk?
CHAPTER 2 1
,
Outline Decision-Support Systems
DSS Design Examples of DSSs
Yield Management: How to Overbook Gracefully Distributing the Gas at APC The Promise of DSSs Executive Information Systems Group Decision-Support Systems
Technology-Assisted Meetings Groupware and Organizational Knowledge What Are the Options? Multimedia for Business, Education, and Entertainment
What Is Digital Convergence? Hypertext: The Engine for Multimedia?
Focus on Change
The technologies described in this chapter can play a major role in transforming the way you do business and manage the firm. Executive information systems, decision-support systems, and groupware offer support to the manager and are 559
560
PART FIVE: EXCITING DIRECTIONS IN SYSTEMS
ways to coordinate the organization that would not be possible without IT. These technologies have great potential for changing the way people in the organization perform their jobs. Groupware, in particular, offers a platform for several different applications of technology. Groupware can coordinate the activities of individuals with a common task and enable people working together to be in different loca tions around the world. •
This chapter discusses a wide range of systems intended to support the way people work. These systems by and large do not process transactions. Instead, they provide information for decision making, or they support groups of people working together on some task. They may use data collected and processed by a transactions system, but they analyze these data far differently than the system that maintains the database. DECISION-SUPPORT SYSTEMS
A decision-support system (DSS) is a computer-based system that helps the deci sion maker utilize data and models to solve unstructured problems (Sprague and Carlson, 1982). One of the most frequently used DSSs is a spreadsheet package. The user builds a model and looks at the impact of changing certain variables or assumptions. A user might look at the impact of a change in interest rates on a possible investment in a new manufacturing plant, for example. Alter ( 1980) offers a framework for classifying different types of DSSs. His origi nal framework has a number of categories that can be summarized into two main types: data-oriented and model-based DSSs. A data-oriented system provides tools for the manipulation and analysis of data. Various kinds of statistical tests can be run, and data can be combined in different ways for display. A model-based system generally has some kind of mathematical model of the decision being supported. For example, the model might be an operations research optimizing model or a simple model represented by a balance sheet and an income statement for a firm. Decision-support systems offer tremendous power for managers who can gen erate and try many different alternatives, asking "what-if' questions and seeing the results. As one manager said, "I'm not being forced to take the first solution that works just because it takes so long to generate an answer; using a model and a spreadsheet program on a PC, I can now try different alternatives and choose the one that looks best." DSS Design
How does the development of a DSS differ from traditional design? • The focus is on decisions, not data flows. • The construction of a DSS tends to follow an iterative or prototyping approach. • Building one of these systems forces the user to become involved in the design process. • The system may be designed with the help of a systems analyst or by the user alone. Many decision makers build their own DSSs for PCs.
CHAPTER 21 : ORGANIZATION SUPPORT SYSTEMS: DSSs, GDSSs, EISs, GROUPWARE, AND MULTIMEDIA
With a DSS, the user looks to be able to interact with the system and change parameters, doing what-if analyses and trying different scenarios. Even in a DSS that is used primarily to supply data and statistical analysis, it is helpful for the user to be able to generate interactively the statistics from a Pc. The systems pro fessional working to develop a DSS faces a problem for which the conventional systems life cycle may not be well suited. The DSS often involves an unstructured decision problem, making it difficult to develop detailed logic specifications. If a group of users is involved, there may be no consensus on the identification of the problem or on the definition of a system. Under these conditions, an evolutionary, prototyping approach is likely to be the most successful. The developer begins by building a small model of the sys tem. As users are exposed to the model over time, the specifications evolve. An evolutionary approach has the advantage of providing rapid feedback to users, both to obtain feedback on design and to maintain the users' interest in the project. Today users develop the preponderance of DSSs on their own PCs. The user will not follow a formal design process, but will build and test different versions of the DSS until a satisfactory version is obtained. The ability to develop decision models quickly and easily on a PC has had a major impact on the way decisions are made in the firm. Instead of arriving at a solution that works, you will try many different scenarios and pick the best one. Information technology is clearly doing more than processing transactions. With DDSs, key operational and managerial decisions in the firm are being addressed.
Before its merger with M ercedes Benz, Chrysler began to open its mainframe pro duction computer systems to some 2000 peo ple in the company. These business ana lysts and others can use a "point-and-click" interface to access Chrysler information, so just about anyone with a Web browser can obtain data. The effort required to provide this support to a wide range of people mak ing decisions about Chrysler was signifi cant. The company has integrated 21 main frame transactions processing systems to generate the data. The fact that the Web based access is directly to the mainframes rather than databases on servers is un usual. However, Chrysler felt that servers might have a problem handling the one mil-
lion transactions a day with a fast response time to users at assembly plants around the world. Before the integration effort, users had to sign on and collect data from the 21 different mainframe systems to get a comprehensive view of Chrysler's operations. Frequently these users had to enter data into a spread sheet to consolidate it for analysis. As an ex ample, if an analyst finds a shortage of brake rotors, it is easy now to see the impact on the company's 21 assembly plants and alter production schedules to avoid a prob l e m . Decision s u pport needs data, and Chrysler has made an extensive effort to make needed information available to its employees through this Intranet.
561
562
PART FIVE: EXCITING DIRECTIONS IN SYSTEMS
EXAMPLES OF DSSs
In this section, we look at decision-support systems in some detail to illustrate the contribution they make to the organization. Yield Management: How to Overbook Gracefully
American Airlines faces a problem common to the industry: How can it maximize the revenue or yield from each flight? Yield management for an airline is like inc ventory control for a food manufacturer. If food items are left in inventory past a certain date, they must be discarded as spoiled. American estimates that without controls to allow for overbooking, 15 percent of its seats would be "spoiled" on sold out flights. American Airlines estimated that solving the yield management problem using a nonlinear, stochastic, mixed-integer mathematical program would require ap proximately 250 million decision variables for its entire route system. Instead of developing a single model, American Airlines' operations research group devel oped a series of models to attack three more manageable subproblems (Smith et aI., 1992): 1. The first of the models controls overbooking, the practice of intentionally sell ing more reservations for a flight than there are seats on the aircraft. An airline overbooks because it expects a certain number of cancellations and no-shows at the gate. 2. The second model helps American Airlines decide how many discount seats to offer on a flight. 3. The third model, traffic management, controls reservations by passenger origin and destination to maximize revenue. Because of the current hub-and-spoke system, the flights are interdependent; a passenger flying into the DallaslFort Worth hub may leave on any number of other flights to reach his or her final destination. Overbooking Figure 21-1 illustrates the overbooking problem. Overbooking al lows the airline to accommodate more passengers, but there are penalties associ ated with denying passengers boarding if they have a confirmed reservation. The airline must compensate "bumped" passengers, and it must provide an alternative flight for them. This cost of overbooking actually increases with the number of passengers denied seats. For example, the airline may have to offer more hotel and meal vouchers and may have to transport the bumped passenger on another air line's flights. American Airlines developed an optimization model shown in Figure 21-2. As the overbooking level increases, net revenue, which is passenger revenue minus overbooking costs, rises to a maximum value and then decreases as the cost of an additional oversale exceeds the value of an additional reservation. The overbook ing model draws on data from the SABRE reservation system. The overbooking level has a constraint to prevent degrading passenger service too much. It relies on
CHAPTER 2 1 : ORGANIZATION SUPPORT SYSTEMS: DSSs, GDSSs, EISs, G ROUPWARE, AND MULTIMEDIA
Capacity
r----"� - - - - -- - - - - - -- - - - - - - -
FIGURE
21·1
Overbooking allows more reservations to be accepted.
four forecasts: the probability a passenger will cancel, the probability of a no show, the probability that a bumped passenger will take another American Airline flight, and the oversale cost. Discount Seats The large number of special fares and discounts greatly com plicates the problem of maximizing revenue from a flight. Because there is a fixed number of seats on a plane, selling a seat at a discount that could be sold for a full fare reduces overall revenue. American Airlines cannot control fare classes independently; otherwise it could sell a low-fare seat while turning away a passenger willing to pay full fare. American Airlines uses a marginal revenue approach to determine how many seats to sell in a given fare class. The approach uses a heuristic that finds an acceptable, but not necessarily optimal, solution. Traffic Management With the introduction of the hub-and-spoke traffic sys tem, American's percentage of passengers flying into a hub to connect with
563
564
PART FIVE: EXCITING DI RECTIONS IN SYSTEMS
FIGURE 2 1 ·2
An optimization model.
another flight has gone from 10 percent to more than 60 percent. Consider the example in Figure 21 -3, which shows a number of alternatives for arriving at and departing from a hub. Flights that used to serve a single market now may serve 30 or more markets. In the example, one might expect that the Portland to Dallas/Fort Worth full fare is less than the Portland to Miami discount fare (connecting through Dallas/Fort Worth), which should be less than the Portland to Miami full fare. American cannot just look at a fare class, it must also con sider likely routes. If the airline was controlled by just the proportion of full and discount fares, it might accept a full-fare Portland to Dallas/Fort Worth pas senger while turning away a discount seat from Portland to Miami, a decision that would lower total revenue. Ideally, the airline would exert control on a market and fare class basis. However, the large number of markets and fares makes this computationally in feasible. American developed a method of clustering similar market/fare classes into groupings it calls "buckets" to make the problem more manageable. All the market/fare classes on each flight are clustered into eight buckets. First and business class go into separate buckets while coach market/fare classes are in
CHAPTER 21 : ORGANIZATION SUPPORT SYSTEMS: DSSs, GDSSs, EISs, GROUPWARE, AND MULTIMEDIA
Taco Bell, the chain of fast food restau rants, has about 6500 company-owned, li censed and franchised locations in all 50 states and abroad. The company's sales are over $4.5 billion worldwide. Labor costs represent about 30 percent of every sales dollar. Because food must be fresh when it is sold, it is hard to even the demand for labor. The firm cannot use slow periods to make and warehouse food . Over half of daily sales in a typical store take place dur ing a three-hour lunch period. As a result, scheduling labor is a continuing, difficult problem for the chain. Management decided in the late 1 980s to implement "value meals" as a way to ex pand sales. To manage in a more complex environment, the company installed in each restaurant pes connected to a mainframe at corporate headquarters and began to de velop new systems to support the stores. A project team conceptualized a restaurant as
three related subsystems: customer service, delivery of food, and production of food. The important trade-off for the project team is the one between labor and speed of ser vice, a parameter directly related to cus tomer satisfaction. The project team developed a forecast ing model and simulation model providing input for an i nteger linear p ro g ra m m i n g model that generates a schedule for labor. The store manager reviews this schedule before posting it for his or her restaurant. The objective of the schedule is to produce the fastest service while minimizing payroll costs. Taco Bell estimates that the modeling effort, w h i c h cost u n d e r $300,000, has saved over $50 million in labor costs. There are many opportunities to combine informa tion technology and modeling to create pow erful decision"support systems capable of improving the bottom line.
the remaining buckets (see Figure 21-4). As sales increase, the availability of seats is restricted first to low-value reservations regardless of market/fare class. Although this problem may seem simple, American Airlines currently has 1 50,000 market/fare classes. American Airlines uses a dynamic programming algorithm to index the marketlfare classes into buckets. The idea is to maximize the variability of market/fare class values between buckets while minimizing the variability within a given bucket. Every time a passenger requests a flight, the SABRE system accesses a condensed table containing bucket information. The system scans the bucket in formation until it finds the appropriate category for the reservation request, and then makes a decision on whether or not to offer the seat at that fare. Results American Airlines has developed models to estimate the benefits of the DSS described above. The overbooking DSS has been in use since 1 990, and it is estimated to have increased revenue by more than $200 million each year. The discount-seat allocation model is estimated to have obtained from 30 to 49 per cent of the revenue opportunity from discount sales, resulting in additional rev enue of $200 to $300 million. In three years, the total yield management program
565
566
PART FIVE: EXCITING DIRECTIONS IN SYSTEMS
FIGURE 2 1 ·3
The hub-and-spoke traffic system.
produced quantifiable benefits of more than $ 1 .4 billion for American Airlines. For that same three-year period, American Airlines had a net profit of $892 mil lion. This example shows that sophisticated operations research models within decision-support systems can have substantial returns for the organization. Distributing the Gas at APe
Air Products and Chemicals (APC) produces industrial gases such as oxygen, nitro gen, hydrogen, argon, and carbon monoxide. The company's sales exceed $1.5 bil lion per year with nearly 19,000 employees in 13 countries. The industrial gas divi sion uses highly automated equipment to manufacture and distribute liquid gases. However, scheduling and delivery of the gases used to be a manual process. Liquid oxygen and nitrogen are produced in APC's automated plants, which also serve as supply depots. The supplier maintains and monitors storage tanks at customer loca tions. Because the production costs for all manufacturers are about the same, com petition is based on service, marketing, pricing, and lower costs from more efficient distribution. The nature of the relationship with customers provides the gas supplier a great deal of freedom in planning operations. The supplier decides when to send a
CHAPTER 21 : ORGANIZATION SUPPORT SYSTEMS: DSSs, G DSSs, EISs, G ROUPWARE, AND MULTIMEDIA
FIGURE 2 1 ·4
To control market/fare classes, American Airlines clusters them into "buckets."
shipment based on the inventory in the customer's tank, as well as how much to deliver, how to combine different loads on a truck, and how to route the vehicle. This large amount of freedom makes APC's scheduling much more complex compared with other scheduling problems. Typical APC problems involve several hundred customers and 20 trucks per scheduler. The Vehicle Scheduling System APC formed a team to improve the operational efficiency of delivery scheduling. The completed system, developed and tested carefully before being widely implemented, makes use of six data files: 1. Customer file, including capacity of tanks, safety stock levels, and historical
product usage 2. Resource file, containing a description of each truck in the system, capacity by state, and a list of customers feasibly served by each truck
567
568
PART FIVE: EXCITING DIRECTIONS IN SYSTEMS
3. Cost file, including a per-mile rate for vehicle fuel and maintenance and driver pay regulations 4. Mileage file, a network representation of the road system of the United States 5. Time and distance file, containing the distance, travel time, and toll cost be tween any pair of customers computed from the mileage file 6. Schedule file, containing the schedules developed by the system
The scheduling system produces a list of trips to be taken over the next several days, including start time, scheduled vehicle, quantity of product for each cus tomer, time at which delivery should be completed, and length and cost of the trip. A scheduler can examine this output and make changes necessitated by contingen cies not reflected in the system. The scheduling system solves a very large mixed-integer program to near opti mality using a special algorithm developed for this project. The model can contain up to 800,000 variables and 200,000 constants. The authors believe that this is one of the largest integer programs regularly solved to a state of near optimality. This DSS contains one of the largest operations research models reported in routine use in the literature. It is an example of how the power of the computer can be used not only to compute a solution but also to present it to a user through a decision-support system. THE PROMISE OF DDSs
The systems described in this section provide information to support decisions. A number of decisions are programmed into the systems. They also evaluate differ ent alternatives and process information that is presented to and acted on by the decision maker. The American Airlines and APC systems showed costs savings, something that is more difficult for other types of DSSs. What is the value of bet ter planning? How do we know that the decision makers using these systems per form better than they did under the previous manual systems? For many DSSs, justification is not done or is based on the faith of the managers involved that the model is helping to solve a problem. EXECUTIVE INFORMATION SYSTEMS
A number of consulting and software companies suggest that firms need an execu tive information system (EIS). What is an EIS? Companies build an EIS to bring to senior management information that needs its attention. For example, the execu tive vice president of Phillips Petroleum uses an EIS to check the state of the firm's oil and chemicals business. The system also provides a summary of world news. The vice president feels that the system saves him an hour a day because it pulls together previously less accessible information in one place. An EIS often involves a mainframe, where much of the data of interest to senior executives reside. However, the data are not easily accessible, and the EIS soft ware must summarize data and make them available for downloading to a personal
CHAPTER 21 : ORGANIZATION SUPPORT SYSTEMS: DSSs, GDSSs, EISs, G ROUPWARE, AND MULTIMEDIA
computer in the executive's office. Since many managers do not like to type and are not comfortable with computers, EIS designers focus on providing an appeal ing interface and a system that is easy to use. One characteristic of these systems is a "drill down" feature. The user first sees figures at a high summary level. If these numbers look all right, the user continues. However, if some total looks unusual-for example, sales in the western region are lower than expected-the user puts the cursor on the suspicious figure, clicks the mouse button, and sees a display that contains more detail on just the western region. Depending on how the system is designed, the user might be able to drill down several levels to get to quite detailed data. Senior managers who use these systems praise them highly. A power company president reports that he can view a series of corporate indicators with one key stroke. He can create a personal menu to look at the indicators he needs to review on a daily basis. This executive feels that the system has improved communica tions throughout the organization. Another executive uses the system to look for trouble spots and find out why a division's expenses are higher than anticipated. He gets a quick snapshot of his
569
570
PART FIVE: EXCITING D I RECTIONS IN SYSTEMS
FIGURE 21 -5
An example of an EIS GUI.
competitor's financial position through the system as well. Another manager uses the firm's EIS to check for exceptions, such as shipments to customers that are taking too long. Setting up the system forced his company to think about its busi ness and which indicators it wanted to monitor. There are a number of ways to develop an EIS. Several vendors offer software designed to access mainframe databases and provide a graphical user interface (GUI) for executives. At least two of these products are Microsoft Windows appli cations. Others are built for use on the Web. See Figure 21-5 for an example of one of these products. It is also possible to develop one's own EIS within the company. Is an EIS any different from a DSS? An EIS is a type of DSS, but in general it tends to be data oriented rather than model oriented. The systems created to date allow executives to view data and summarize them in different ways. Of course designers have to be very careful and resourceful when designing an application to be used personally by the highest levels of management in the organization! GROUP DECISION·SUPPORT SYSTEMS
There is much interest in using information technology to support workgroups. A workgroup consists of individuals who have some need to work together. Theoreti cally, any number could be involved, but typically we find 2 to 20 people who must work on a problem forming a group. How can IT support such a workgroup? One way is with a group decision-support system (GDSS). A GDSS consists of special software and physical facilities, such as a conference room containing pes for each person in the room. The software helps identify issues and evaluate alternative decisions and actions. A GDSS might also contain a model whose solu tion provides participants in the group with insights into their problem. Workgroup decision making may also be supported using technology when the workgroup is dispersed. Electronic mail allows members of a group to exchange
CHAPTER 21 : ORGANIZATION SUPPORT SYSTEMS: DSSs, GDSSs, EISs, GROUPWARE, AND MULTIMEDIA
messages at any time of the day or night and is insensitive to time zones. An ex tension of e-mail is the electronic conference. Individuals can all be on-line to a computer at the same time for a conference, or they can join the conference when ever they like, reading and responding to the comments of others at their leisure. Existing computer packages can be used in a group setting. A network of per sonal computers might be used to share data on a problem or to share a spread sheet. A database management package on the network server could provide com mon data for each participant in a group at his or her own personal computer connected to the LAN. Technology-Assisted Meetings A number of companies use specially equipped meeting rooms with GDSS soft
ware to conduct meetings. IBM installed a number of electronic meeting rooms based on a room developed at the University of Arizona. A typical meeting room has participants seated at a horseshoe-shaped table, each with a personal computer connected to a network and file server. A projection screen is placed at the open end of the horseshoe to show what is on the discussion leader's (facilitator's) Pc. The role of the leader is very important in setting the pace of the meeting and in helping to form a consensus. A typical meeting might begin by stating the problem to be addressed. Participants brainstorm at their PCs for some period of time, say, 1 5 minutes to an hour. Each comment appears on all workstations, but without at tribution; that is, no one knows who typed a particular entry. This anonymity is one of the features that makes an electronic meeting very different from a conven tional one. It is felt that participants will be less reticent, particularly around supe riors, if their comments are anonymous. Next, another piece of software can be used to group alternatives into categories generated in the first stages of the meeting. Each participant could then numeri cally rank suggested alternatives. The meeting room software would average the ranks and sort the suggestions according to their average. Different software pack ages offer a variety of features designed to facilitate achieving a consensus about some issue or problem. Do the electronic meeting rooms work? Participants in meetings generally seem enthusiastic about their experiences. Some claim that the use of these facilities and software reduce the frequency of meetings by a factor of 10. It has also been ar gued that solutions are better because no one will be intimidated by a superior, as contributions are anonymous. We should view these claims carefully. Could similar results be achieved with out a special room and elaborate software system? Certainly what the computer system does could be done manually by a facilitator and an assistant. The com puter helps to automate this process, but you could also simply write ideas on a blackboard for all to see. The use of the computer and a high-tech meeting room may make participants feel better about the results of the meeting. Certainly, the act of using such a room says that the topic being discussed is important. What are the drawbacks of electronic meeting rooms? In one case, participants generated about 1000 alternatives in half an hour. It is not clear how a group can
571
572
PART FIVE: EXCITING DI RECTIONS IN SYSTEMS
deal with this number of suggestions ! It seems likely that the appropriateness of this type of meeting depends on the subject matter. If we are looking for a number of creative suggestions to a problem or are trying to generate a lot of alternatives, the room could be very useful. GROUPWARE AND ORGANIZATIONAL KNOWLEDGE
One of the most difficult questions to answer is, "What do managers do?" For the first three or four decades of information technology, IT did little to help managers in their day-to-day tasks, often because IT staff did not understand managers. There were few management information systems, though many companies claimed to have them. The last five years have witnessed the development of groupware, designed to support both the daily tasks of management and coordina tion, and to provide a repository of organizational intelligence. Over 25 years ago, Henry Mintzberg (1973) conducted a classic study of man agers. He observed their behavior by living with them for a week. Based on his observations, Mintzberg identified a number of roles that senior managers play in an organization. One role of management that seems to be universally agreed upon is leadership: the manager is, and should be, a leader for the organization. In this role, managers set direction, act as a public spokesperson, and try to see that the resources of the organization are employed to achieve the objectives they have set forth. Management researchers have emphasized the decision-making nature of man agement since the 1 950s. Certainly, we expect managers to make decisions in many different domains. Important decisions include funding R&D and product development, and the decision to introduce a new product. Many managerial deci sions revolve around issues of resource allocation. Almost every organization is confronted with limited resources and competing demands for them. A role that managers often face is as a disturbance handler. Disputes and prob lems in the organization find their way to managers who are in a position to re solve them. These disturbances may come from inside the firm or they may be prompted by problems with suppliers or customers. Managers also deal with information in their j ob s and function as the spokesperson for the firm. Good managers scan the environment for competitive actions, threats, and new opportunities. Today companies are very dependent on government regulations and actions. Trade treaties can make a major difference to a firm's strategy and operations. The discussion so far has been about managerial roles, but what actually do managers do during the day? Mintzberg divided his observations into 5 categories. The first of these was scheduled meetings, which consumed over half of the day for the CEOs he studied. Next came unspecified desk work. Unscheduled meet ings took 10 percent of the day while phone calls consumed 6 percent of the man agers' time. Finally, managers spent a small amount of time on "tours," or "man agement by walking around."
CHAPTER 21 : ORGANIZATION SUPPORT SYSTEMS: DSSs, GDSSs, EISs, G ROUPWARE, AND MULTIMEDIA
This analysis of the distribution of time for various activities begins to get at the tasks managers perform. Two activities cut across all of the roles and tasks: com munications and information processing. As a leader, spokesperson, decision maker, disturbance handler, and in most other roles, managers are communicating with others. They disseminate the strategy and goals of the firm. Managers receive communications from subordinates, customers, suppliers, the financial commu nity, and many others. Meetings, both scheduled and unscheduled, involve com munications as do phone calls and tours. Much of desk work involves letters and memos, which are also a form of communications. Many communications and much purposeful managerial work revolve around information processing. We frequently communicate to obtain new in formation. When making a decision, managers must process information to de termine the appropriate course of action to take. Suppliers and customers want information. The securities industry seeks information about company plans and performance. The technology described below is designed to support people in the organiza tion in the tasks they are expected to peiform. This technology lets managers and other workers redesign their tasks. It provides a great deal of flexibility and a num ber of alternatives for the flow of work, communications, and coordination. Most information systems prior to the development of groupware were ori ented toward solving problems in the organization, such as how much of a good to produce, how to process orders, and so on. Groupware is aimed at what a manager does-it supports members of the organization who have a common task and who operate in a shared environment. Groupware is sometimes called "coordination software" because it helps man agers coordinate the work of others in the firm to ensure that the resources of the firm are applied to achieving its objectives. Coordination means managing de pendencies, that is, seeing that individuals or groups that depend on each other or on common resources function effectively. When discussing groupware, it is difficult not to focus on Lotus Notes, a prod uct with about a three-year head start on its competition (see Figure 21-6). What is Lotus Notes? Groupware and Notes are hard to define; even the vendors have dif ficulty describing the nature of the products. First, Notes is based on client-server computing; the product assumes that users or clients are connected on a local area network with a server. Databases to be shared are kept on the server, though you may have a local database on your own Pc. One of Notes' major features is its ability to replicate databases across departments and organizations. You can tell Notes how often to synchronize databases, and it will make sure that all informa tion is consistent. For example, suppose that you worked for an advertising agency, and the New York and Rome offices are preparing a campaign for a global client. If teams in New York and Rome use Notes, the system could be set up to automatically update databases at, say, 9:00 P.M. U.S. time. Lotus Notes will update both databases to add new information without losing existing data. Thus, team members in New
573
C I don't wantresponses from the Invitees Clndy Brady
(a)
Tim O__
Angela Finn$\'
BiliBh. TimD_ KarimKovacevic
05I121S7
Michelle Ch_ 05I121S7 MarvOoucett.
G lis. R Kilborn
05114197 05114197
MOnday staff _ting Re: MOnday staff � Re: MOnday staff _ing Re: MOnday staff _ing Plan posting Ide.. needed -Web _1 activating: pwgraro numbm NY ,97NV � T.avelAgenoy T.ansilionAtmouncemarlt A..ehedule- 2H program plarming (22 May 02:00 PM EDT)
(b) FIGURE
574
21 -6
(a) Notes completed invitation. (b) Notes mail and desktop.
Headlines for lance Prather For 06/01/98 • lul'lChOme luminaries : Pel.. fI'!)eGl1 of Burl"". DoveIopmen! wi!
Index �. � � !!lM Il§EI Ni&E!
last
Change
9126J15
+1 1 .21
1 1 1 1 .57
+UO
+6.04
1311 .04
+0.09
122.63 85.31
current temp: 64°F partly cloudy
Boston, MA Tua.day, May 26 l.st �9:16 am eoT
(c)
is the openin,g section of the market analysis, Please screen and be sure to use different colors. hoping; to
will all reviewers take
have the fmal copy c<>njpletely consolidated by week' $
care to use the editing tool, on the
end for delivery to the client.
all intents and pUlposes, the fir,t half of 1997 can be characterized a. strong for Millennia International. We
move into the second half; the strong product offerings coming out of the newly acquired pui,lisllinl! h<>us·e w positive returns <
(d) FIG URE
21 -6
(continued)
(c) Personal page. (d) Market analysis document.
575
576
PART FIVE: EXCITING DIRECTIONS I N SYSTEMS
sma
rway to inveBt
(e) FIGURE 21 ·6-CONTINUED
(e) Notes and the I nternet.
York and Rome can make changes during the day with impunity. The software replicates those changes on both copies of the database. (If two individuals change the same information, Notes flags the changes and leaves it to the people involved to resolve the conflict.) This database replication feature is one of Notes' coordination features. The software coordinates diverse workgroups and allows them to share information without worrying about updating anomalies. Just having the same database easily available to multiple individuals working on a project, regardless of replication, promotes coordination as well. Lotus Notes also has its own e-mail system. so Notes users can communicate with each other. The second feature of Notes that makes it suitable for supporting individuals with a common task is its applications development tools. It is fairly easy to de sign quite powerful applications and share them on the system. For example, it took about 1 5 minutes to design a shared database of the common materials (videotapes, computer demonstrations, etc.) available for each class session of one of our MBA courses in information systems. Notes has aggressively integrated its products with the Internet and World Wide Web. Lotus has modified its original Notes software so that a Notes "Domino"
CHAPTER 21 : ORGANIZATION SUPPORT SYSTEMS: DSSs, GDSSs, EISs, GROUPWARE, AND MULTIMEDIA
NOTES ON THE NET The president of Lotus commented at a press confer ence announcing Notes' strategy for the Internet: "It's our view that essentially all infrastructure com ponents, . . . servers, database servers, transaction servers, all the servers you can imagine, are going to become Web servers. Virtually all client applications [will be] Web-enabled so that applications go out to the Web directly. "The Web today is a distributed file system . . . access to that file system will be implemented in all sorts of applications. The Web is unbelievably ubiq uitous . . . All sorts of servers plug into the Web . . . At Lotus, we have over 8000 (Web) pages and 83 different Notes databases that roll up into our Web site . . . Suddenly I need tools for searching the site and viewing indexes of data. I need to be able to get forms out. I need to be able to accept that data back. I need to be able to search back in databases [and to] . . . interface to transaction processing sys tems. I may want to implement workflow. I may want to have data . . . coming back, bringing it to gether with database data and then moving this among a number of people . . . "The Notes document database can contain either HTML pages or Notes documents in Notes formats . . . We do dynamic translation between HTML and Notes structures . . . If I author a document in Notes and store it in a Notes database and someone ac cesses it from a Web browser, we on the fly translate it to HTML. Likewise if a document is authored in HTML, stored in a Notes database using . . . Word
577
. . . and someone accesses it from a Notes client, we translate it to Notes format . . . "We bring to the Web server market a database ap proach as opposed to a file system approach. We have in Notes . . . a richly structured document database we think gives us a great advantage in Web sites as they get larger . . . Lotus' s Web site has 8500 pages . . . a year from now it will have 20,000 pages. IBM's Web site today has 40,000 pages. "All the development facilities that exist in Notes are now available to build Web applications . . . . Most of the applications built by our 1 1 ,000 partners that run on Notes servers can now be accessed from Web browsers. A Notes application consists of defin ing databases, defining forms, defining scripts that the client and server use to manipulate the data, and in many applications providing the linkage to rela tional database systems to transactions systems, etc. "We will deliver . . . four specific application frameworks, one for publishing which includes full subscription management, one for electronic com merce, . . . one for customer service and one for marketing . . . All of these are built on top of the Notes server. . . . The most compelling part of . . . Notes . . . on the Web is [this] . . . piece. It's the ability to rapidly build the kinds of applications we think people are going to demand on the Web. . . . People can use Notes clients to build these applica tions, deploy them on Notes servers and have them fully accessible on the Web . . . Notes is optimized for symmetric multiprocessing systems to support upwards of a thousand simultaneous sessions per server."
server is also a Web server. The software automatically translates information on the server into HTML (see Chapter 12) format if a Web browser requests it or into Notes format for a Notes client. Lotus believes that Notes is a natural authoring environment for Web information. More than that, Notes is positioned for easy ap plications development on the Web. Lotus Notes lets companies conduct transac tions over the Web, thus allowing them to do more than just retrieve static infor mation. Lotus Notes lets you interact with the person using the client. For example, a magazine publisher would want to have a button on its Web site that a person visiting the site clicks to get a form for subscribing to the magazine. The publisher also would want to accept that person's credit card, search its database to
578
PART FIVE: EXCITING DIRECTIONS IN SYSTEMS
see if this is a new subscriber, and send a message welcoming a new reader or welcoming back an old subscriber. For more information on Lotus's Internet strat egy, see "Notes on the Net." How are firms using Lotus Notes? Significant adopters of the system include General Motors Europe, major consulting firms, and several Big Six accounting firms, including Peat Marwick and Coopers & Lybrand. We studied how one con sulting firm used the technology. Interestingly enough, Notes was not used exten sively to manage customer engagements. Rather, the firm was using Notes inter nally to improve administration. Just as with any other company, a consulting firm has to administer itself. One consultant firm, with revenues in excess of two billion dollars a year, has to ad minister personnel, manage billings and collections, administer contracts, and perform a wide variety of administrative tasks. The practice manager for the northeast described how Notes improved his operations. The firm had developed a number of administrative applications. His group of direct reports from around the region was able to dramatically reduce the number of meetings through the use of groupware. Compaq Computer found that its sales staff uses Notes to communicate with customers and rarely comes into the office, preferring to work at home. Boston Market, a rapidly growing restaurant chain, uses Notes to keep track of expansion plans, market research, advertising, cooking procedures, and recipes. Essentially, Notes (and groupware) is becoming the leading dispenser of knowledge in the corporation. Chase Manhattan Bank has a major Notes site with thousands of users across a highly distributed network. One of Chase's major applications is a service that fol lows investment reports from providers like Dow Jones. The system is designed to help the analyst spot differences between the bank's evaluation of a company and the evaluation from these other services. Explanations about the differences are posted to a database where they are widely available. The CIa at Chase Manhattan Bank feels that Notes is unique because it lets you develop applications not previously undertaken; that is, since applications are easy enough to construct, ideas for systems that were infeasible using older tech nologies suddenly become easy to justify. Chase Manhattan Bank is using Notes in its systems development division on several different kinds of projects. It is par ticularly useful in coordinating employees who work in London, Brooklyn, and Lexington, Massachusetts. Applegate and Stoddard ( 1 993) reported on the use of Notes at Chemical Bank prior to its merger with Chase. At Chemical Bank, it was the Corporate Systems Division (CSD) that first became interested in groupware. The senior vice president of corporate systems was launching a productivity program to generate more output from the design and programming staff at the bank. He felt that the division' s work was communications intensive and that it was breaking down using conventional forms of communicating. His estimate was
CHAPTER 21 : ORGANIZATION SUPPORT SYSTEMS: DSSs, GDSSs, EISs, G ROUPWARE, AND MULTIMEDIA
that Notes would allow a 15 percent productivity improvement for a staff whose salaries totaled $ 1 5 million a year. The vice president also viewed a test in CSD as a good preview for rolling out Notes in the rest of the bank. The bank brought in a groupware consultant and offered training in the use of Lotus Notes in anticipation of its implementation. The vice president hired a full time Notes specialist and formed a Notes support group to assist users. Roll out began with 20 senior managers and their secretaries. In a period of less than two years, 300 CSD employees were using Notes and the bank had developed more than 90 applications with Notes. In the middle of this effort, Chemical Bank decided to first centralize IT re sources, then initiate a 40 percent reduction in IT staff. Shortly thereafter, Chemi cal Bank announced its merger with Manufacturer's Hanover Bank. During this period, turmoil ruled the systems division, and one major application the vice president initiated was the "rumor mill." Concerned employees could post rumors to the rumor mill database, and senior managers would respond. The vice presi dent felt that this simple technique helped create a feeling of trust and openness in the group. One manager remarked that Lotus Notes let developers create applications quickly to respond to a business need. It also helps create geographic indepen dence. In one application a group in New York worked with developers at a Texas bank owned by Chemical Bank. Lotus Notes also helps make work independent of time since it reduces the need for face-to-face communications. A Wall Street Journal staff writer found that groupware tended to erode the hi erarchical nature of organizations. In some cases, however, groupware created problems for management. The vice president at Chemical Bank discussed above resigned after the Manufacturer's Hanover merger, and his successor eliminated the rumor mill. It seemed that the forum had become "unruly" and had begun to receive a number of cutting criticisms of management. The thrust of the report, however, was more positive. The reporter talked to var ious managers who felt that groupware helped dissolve corporate hierarchy by making it easy to share information. The rank and file can join discussions with senior management if given access to groupware. One major contribution of groupware is providing organizational knowledge where it is needed. For example, a worldwide consulting firm like Andersen Con sulting, with thousands of employees, has a great deal of expertise. A consultant in Japan may need a way to find out if the company solved a problem similar to the one she is facing in some other country; Andersen uses groupware. to provide this knowledge base. In Chapter 19 we discussed the Customer Services Division at Zeta, where employees provide consulting help to customers. These consultants built a large Notes database of problems and solutions, and then began to use this knowledge base to answer new queries from customers. An important role of groupware is to capture organizational knowledge and make it available anyplace in the firm.
579
580
PART FIVE: EXCITING D IRECTIONS IN SYSTEMS
Companies are using the World Wide Web to set up internal web sites or Intranets. These sites may be isolated from the Internet and only available within the firm, or outsiders may be given access, an Extranet. Much of the in formation on an internal web server could also be put on Notes. Which platform is best suited for each different type of information? Companies are taking a mixed approach. Andersen Consulting is one of the largest Notes customers with over 23,000 users world-wide . The company is using Web servers for a training program in its object oriented development methodology. The Web's hypertext environment made it easy for students to use the system. The developers praised the Web as a teaching environment.
Notes has a real advantage in terms of document control, security and workflow fea tures. Notes is also appropriate for coordi nating groups who must work on the same documents. Notes makes it easy to route documents electronically and it has auto matic database replication across different servers. Notes has developed its own links to the Internet in order to satisfy customer in terest in the Web. With its Domino server, Notes also is one approach to developing Web content and publishing it for others to use. Will compa nies move exclusively to Intranets, or will your organization have to maintain a Web site and a groupware system?
A side benefit of groupware is the way shared information can be used to en hance decision making. This technology may make it easier to create decision support systems and expert systems since data and expertise are now widely avail able in an organization. A number of companies are using Lotus Notes to connect with clients and suppliers. Officials at Notes present this system as the "defining element of the Information Superhighway," feeling that electronic commerce is far more im portant than video on demand or games. Of course, a few cautions are needed. Like the phone or any other network, the system works only if everyone who needs access has it. Networks only become useful to service providers and consumers when they reach a critical mass. An other major threat to Lotus Notes is the World Wide Web (see "Notes versus the Web," above). A number of companies are posting information to the WWW. Mor gan Stanley is using an Intranet to present information like telephone directories, equity analysis reports, and SEC filings. These applications could also be imple mented with Notes. It will be interesting to see if Lotus and IBM are able to co-opt the threat of the Internet with their Domino Internet Notes server. WHAT ARE THE OPTIONS?
There are a number of ways in which groups of people can work together electroni cally. Figure 21-7 is a useful framework for thinking about the options. When peo ple are working at the same time in the same place, then a group decision-support system and an electronic meeting room can provide support for their shared tasks.
CHAPTER 21 : ORGANIZATION SUPPORT SYSTEMS: DSSs, GDSSs, EISs, GROUPWARE, AND MULTIMEDIA
FIGURE 21 -7
Framework for electronic coordination.
Every business day, over $1 .23 trillion of cur rency trades take place in the global econ omy. London, New York, and Tokyo are the centers for foreign currency exchange, though banks all over the world trade for customers and their own accounts. About half these trades utilize the Reuters Dealing System, which connects some 4000 banks worldwide. (Approximately half of exchange transactions are electronic, and Reuters has a 96 percent market share of electronic trades.) Currency trading demands a real-time network and real-time decision maki n g . Banks hold their trading positions for only a few minutes in many cases. Traders must make lightning-fast trading decisions, and they place heavy demands on an electronic exchange network. The currency market is a single global marketplace with price trends available to all participants. Specific trans actions between the banks, however, are
private. Traders contact each other continu ously asking for quotes as they try to dis cern how markets are moving. Up to 80 per cent of requests for a bid-ask quote do not result in a trade. Traders type messages on their screens, which appear instantaneously on the screen of the intended recipient. A typical conversation requests a bid-offer quote from the called bank. This bank re sponds, and the original calling bank ac cepts or declines the quote. This entire con versation may take place in less than a minute. Foreign exchange trading requires high speed decision making; the Reuters Dealing System provides i nformation to make this marketplace operate globally. During the currency crises at the end of the 1 990s, the ability of this network to rapidly move large amounts of currency around the world be came evident.
If you want to work from different locations at the same time, then there is increas ing interest in videoconferencing, especially using the Internet. Chat rooms are an other possibility, though they do not seem all that popular in business. If those with a shared task are only able to communicate at different times, then location is not too important. Groupware and e-mail are two technologies that facilitate asynchro nous communications.
581
582
PART FIVE: EXCITING DIRECTIONS IN SYSTEMS
MULTIMEDIA FOR BUSINESS, EDUCATION, AND ENTERTAINMENT
Multimedia is generally defined as a combination of different presentation media which are coordinated through a personal computer workstation. Media that might be included are:
Artwork or still pictures Full or partial motion video Sound Text • Graphics • Animation
• • • •
Multimedia is used with a windowing user interface. A few examples will help to illustrate the concept. (Unfortunately, a printed book cannot present all of the media above! ) We have created a multimedia presentation of the Merrill Lynch system reengi neering project discussed in Chapter 18. The student begins reading one of two narratives about the system. By using the mouse to select a highlighted part of the new system description, the student can choose to see a data flow diagram (DFD) of that part of the system in a window on-screen. (The DFDs were created with a CASE package for the PC.) The child can move around the DFD and use the mouse to go from a higher-level to a lower-level diagram. He or she can click on a process in the DFD, and a window appears with a video scene showing that pro cessing. Using the systems design narrative, the user clicks on highlighted phrases and an individual appears in a window discussing that part of the design process. There is a series of CD-ROMS that read to children. In "Arthur's Birthday Party," the computer reads a story to a child while highlighting the text being read. The program reads and displays text in English or Spanish. The student using the program can move the cursor to objects on the screen and click on them after the program finishes reading that page. Each object does something; for example, a baby in a highchair cries and throws food, a teapot does a dance and whistles a tune, etc. The program fascinates children and motivates them to improve their reading skills. At Dartmouth, students studying Italian use a Macintosh to play vignettes from Italian television. The student can select synchronized text and ask the computer to define difficult words, provide a translation in English, or provide a commentary on the culture. At Yale New Haven Hospital, medical residents are learning to identify heart problems using a multimedia computer system. The system displays an animated heart on one monitor and video clips of real dis eased hearts taken by an ultrasound machine on another monitor. By clicking on a stethoscope icon, the student hears a recording of how the diseased heart sounds. This system saves time for the teaching physicians as the residents learn from the multimedia system how to interpret ultrasound images of hearts with different types of problems.
CHAPTER 21 : ORGANIZATION SUPPORT SYSTEMS: DSSs, GDSSs, EISs, G ROUPWARE, AND MULTIMEDIA
The World Wide Web is becoming a significant source of multimedia for edu cation, entertainment, and product promotion. We mentioned the Java program ming language in Chapter 9. This language makes it possible for an Internet browsing program to download and execute programs from servers on the net work. The downloaded programs are interactive and can feature graphics, video, and audio segments. Macromedia, a San Francisco company that sells multime dia software, distributes a program that plays movies on a browser. This pro gram, called Shockwave, displays interactive content on the Web, similar to Macromedia's CD-ROM development programs. The program makes it possible to have automation, sound, and features such as rotating billboards for advertis ers. The Web is a natural distribution channel for multimedia, especially as bandwidths become larger, for example, through ISDN or cable TV access to the Internet. How is multimedia used? From the discussion above, multimedia can poten tially play a large role in education since it allows the instructor to bring together a diverse set of teaching materials and guide access to them. The user can often choose the path through the system, selecting the parts of a presentation to view. The coordination provided by the computer plus this element of choice makes multimedia much more powerful than the use of any single medium alone. There are a number of CD-ROM products for education, some from traditional print publishers and others from companies dedicated to educational software. Corpo rate training departments create their own CD-ROMs when they need to train a large number of workers and want to avoid the expense of courses. Sun Mi crosystems offers a server designed for presenting video information to various clients. This system is aimed at corporate training centers that want to use multi media presentations. There are applications besides education and training. Vendors of goods and services would like to extend their sales outlets without dramatically increasing overhead. One possibility is to use more automated sales outlets in where many in dividuals are present such as airports, train stations, and shopping centers. These automated outlets can make use of multimedia to lead customers through a trans action. Firms have provided their sales forces with notebook computers having CD-ROM drives in order to make multimedia presentations to clients. A second use for multimedia, then, is in business for applications that interactively present information to customers. The third area for multimedia, and probably the application with the greatest in vestment, is entertainment. Many promoters and companies feel that interactive multimedia will be at the center of the next generation of electronic entertainment. Entertainment and technology companies are forming alliances at a rapid pace. U.S. West, a regional phone company, has invested in Time-Warner, a cable and entertainment firm that is merged with Turner Broadcasting. Microsoft would like to have Windows adopted for managing home entertainment. The converter box that sits on top of your TV is expected to be a PC with at least the power of a mod ern Intel chip.
583
584
PART FIVE: EXCITING DIRECTIONS IN SYSTEMS
A Singapore is a city-state of less than 3 mil lion people, occupying a 625 square kilome ter island at t h e southern e n d of t h e Malaysian Peninsula. A small fishing village at the end of World War I I , Singapore has become a developed nation. The country has a literacy rate of almost 90 percent and a l ife expectancy comparable to other postindustrial countries. Singapore has little in the way of natural resources except for a large protected harbor and an excellent loca tion along major shipping routes. The National Computer Board in Singa pore developed a vision of an "intelligent is land." Residents will be able to tap into vast reservoirs of electronic information and ser vices to improve their business, make their working lives easier, and enhance their per sonal, social, recreational, and leisure op tions. Text, sound, pictures, video, docu ments, d e s i g n s , and other forms of information will be transferred and shared
The Singapore ONE home page.
through the high-capacity and high-speed nationwide communications infrastructure made up of fiber optic cables reaching all homes and offices, and a pervasive wireless network operating in tandem. This information infrastructure will also permeate the physical infrastructure, mak i n g m o b i l e telecom puting poss i b l e , and homes, workplaces, airport, seaport, and surface transportation systems "smarter." All kinds of new infrastructure services, linking government, business, and the peo ple, will be created to take advantage of new communications and wireless network technology. In this vision, some 1 5 years from now, Singapore will be among the first countries in the world with an advanced nationwide infor mation infrastructure. It will interconnect computers in virtually every home, office, school, and factory. The computer will evolve into an information appliance, combining the
CHAPTER
21:
ORGANIZATION SUPPORT SYSTEMS: DSSs, G DSSs, EISs, G ROUPWARE, AND MULTIMEDIA
A functions of the telephone, computer, TV, and more. It will provide many ways to com municate and access services. The vision, called IT2000, is based on the far-reaching use of technology (National Computer Board Web Site). The vehicle for accomplishing this vi sion of an intelligent island is a fiber optics communications network. Singapore ONE is a national high-capacity network platform that w i l l d e l iver a potentially u n l i m ited range of multimedia services to the work place, the h ome, and the school. It com prises two distinct but interrelated levels an i nfrastructu re level of networks and switches, and a level of applications and m u ltimedia services. The infrastructu re level will consist of a core broadband net work connecting several local access net works. The core or backbone of Singapore ONE will be built, owned, and operated by an ind ustry consortiu m . Singapore O N E will bring public services closer t o the peo ple and make it more convenient for them to carry out government transactions. Ex amples of services include mu ltifunction kiosks for gove rnment transactions and one-stop government centers with video conferencing facilities. High-speed commu nications will open up a whole new channel for people at home. Potential home appli cations include: high-speed I nternet ac cess, entertainment on demand, electronic shopping, home banking, and electronic in formation services. BETTING ON MULTIMEDIA FOR NATIONAL DEVELOPMENT
Malaysia is planning a "multimedia city" to help bolster the country's technology sector. A Web site describes the effort: The Multimedia Super Corridor (MSC) is an area 1 5 km by 5 0 km r u n n i n g
south o f the Kuala Lumpur City Centre (KLCC) to the Kuala Lumpur I nterna tional Airport (KLlA) which will have ex cellent telecommunications and multime dia infrastructure to induce information technology ( IT) and multimedia com panies to locate in Malaysia. The MSC w i l l be d e v e l o p e d w i t h P u t rajaya, the new adm i n i strative capital of the country and Cyberjaya, an IT city, as the hub and n ucleus of development within the MSC. Cyberjaya, covering an area of ap proximately 7,000 hectares with a future population of 2�40,000, will offer the latest IT infrastructure, top-quality business fa cilities, state-of-the-art multimedia infra structure and a superb living environment to meet the business, residential, and recreational needs of the highly skilled and technologically oriented workforce of the multimedia companies located within the MSC. The Flagsh i p Zone, located in the eastern half of Cyberjaya and covering an area of approximately 2,800 hectares, is the prime phase of Cyberjaya's devel opment and has been specially designed to initiate and catalyse the development of the IT city. The self-contained Flagship Zone offers a superb business and living environment and will consist of four spe cialized functional precincts, namely, en terprise, commercial, residential, and recreational and public areas.
585
586
PART FIVE: EXCITING DIRECTIONS IN SYSTEMS
What Is Digital Convergence?
What is digital convergence and who are the players? Digital convergence sug gests that all data, voice, and entertainment coming into your home will be digi tal. There will be one or more "digital" pipes bringing strings of binary digits to you. The converging digits entering your computer (or television) will, at a mini mum, include phone calls (voice and video), television, movies on demand, and information from mass market services and the Internet. Interactive television, in cluding the ability to interact with programs, order products on the screen, and treat the TV as you might a PC capable of retrieving and presenting all types of media, is a possible result. Will the computer dominate the television set? By 1 998, it was estimated that 40 percent of American homes had PCs; the most fre quent reason for buying a home computer today is access to the Internet. Mi crosoft is urging PC manufacturers to include a TV tuner in the monitors they sell to encourage convergence. The players in digital convergence include: • Content providers, that is, television and movie studios that create entertainment programs and home shopping networks • Broadcast television and cable television: companies that will distribute enter tainment to the home • Long distance and local common carriers that want to supply the pipeline that carries information to the home • Hardware and software manufacturers that want to make set-top boxes and the software to control them • Microsoft which wants cable companies to use Windows CE as the operating system in the set-top boxes that interface the TV set or computer to the cable
All these firms have been buying companies in allied businesses. For example, in 1995 Walt Disney Studios bought ABC television, and Time-Warner merged with Turner Broadcasting. None of these players wants to be left out or lack con tent and the ability to deliver it. The local phone companies have a problem be cause their twisted pair wires into the house have very low bandwidth. While engi neers figured out how to send a movie to the home through compression algorithms, their scheme is not yet practical over long distances. The cost of bring ing fiber optic cable to the home (curbside) is very high. Local phone companies want to purchase cable systems and use their cable as a pipeline for digital infor mation entering the home. Cable reaches more than 95 percent of all TV-equipped households and 90 per cent of all suburban business campuses in the U.S. Some local cable companies compete with phone companies by offering high-speed data communications lines over their cable networks. Many cable operators offer companies bypass facilities to avoid using a local phone company. Some plan to connect to the Internet and provide high-speed switching services like ATM and frame relay. Are there less expensive alternatives? A satellite TV service called DirecTV had reached the level of a million customers within a few years of announcing service and continues to experience rapid growth. The company offers up to 150 program
CHAPTER 21 : ORGANIZATION SUPPORT SYSTEMS: DSSs, GDSSs, EISs, GROUPWARE, AND MULTIMEDIA
A functions of the telephone, computer, TV, and more. It will provide many ways to com municate and access services. The vision, called IT2000, is based on the far-reaching use of technology (National Computer Board Web Site). The vehicle for accomplishing this vi sion of an intelligent island is a fiber optics communications network. Singapore ONE is a national high-capacity network platform that w i l l deliver a pote ntially u n l i mi ted range of multimedia services to the work place, the home, and the school. It com prises two distinct but interrelated levels an i n frastructure level of n etworks and switches, and a level of applications and m u l t i m edia services. The infrastructu re level will consist of a core broadband net work connecting several local access net works. The core or backbone of Singapore ONE will be built, owned, and operated by an industry consort i u m . S i n gapore O N E will bring public services closer t o the peo ple and make it more convenient for them to carry out government transactions. Ex amples of services include m ultifunction kiosks for government transactions and one-stop government centers with video conferencing facilities. High-speed commu nications will open up a whole new channel for people at home. Potential home appli cations include: h igh-speed I nternet ac cess, entertainment on demand, electronic shopping, home banking, and electronic in formation services. BETTING ON MULTIMEDIA FOR NATIONAL DEVELOPMENT
Malaysia is planning a "multimedia city" to help bolster the country's technology sector. A Web site describes the effort: The M ultimedia Super Corridor (MSC) is a n area 1 5 k m by 5 0 km r u n n i n g
south o f the Kuala Lumpur City Centre (KLCC) to the Kuala Lumpur I nterna tional Airport (KLlA) which will have ex cellent telecommunications and multime dia infrastructure to induce information technology (IT) and m u ltimedia com panies to locate in Malaysia. The MSC w i l l b e d e v e l o p e d w i t h P u t rajaya , the new ad ministrative capital of the country and Cyberjaya, an IT city, as the hub and n ucleus of development within the MSC. Cyberjaya, covering an area of ap proximately 7,000 hectares with a future population of 240,000, will offer the latest IT infrastructure, top-quality business fa cilities, state-of-the-art multimedia infra structure and a superb living environment to meet the business, residential, and recreational needs of the highly skilled and technologically oriented workforce of the multimedia companies located within the MSC. The Flagship Zone, located in the eastern half of Cyberjaya and covering an area of approximately 2,800 hectares, is the prime phase of Cyberjaya's devel opment and has been specially designed to initiate and catalyse the development of the IT city. The self-contained Flagship Zone offers a superb business and living environment and will consist of four spe cialized functional precincts, namely, en terprise, commercial, residential, and recreational and public areas.
585
588
PART FIVE: EXCITING DIRECTIONS IN SYSTEMS
The home multimedia computer that you can buy for less than $1000, along with a high-speed Internet connection of, say, 100 million bps, should make multi media very attractive. With this kind of equipment, it will be feasible for you to download a movie from the Net and show it on your high-resolution monitor! If you do not want to spend $1000 on a computer, possibly you will be able to buy one of the "netsurfing" $500 computers to get your multimedia and TV from the Internet. Finally, you can buy WebTV, an attachment to your television set that lets you surf the Internet. Microsoft owns WebTV, a purchase that signals its inten tion to expand its entertainment offerings and combine them with the Web. The debate continues about digital convergence. The local Bell phone com panies have slowed their trials and are trying to figure out what services cus tomers really want. Two "Baby Bells" dropped applications to the FCC to erect interactive networks after the agency had been considering them for two years. Estimates are that it will cost from $ 1 000 to $2000 to wire a home for interac tive multimedia. (Running fiber optic cable to each home in the U.S. could cost $ 1 20 billion.) Meanwhile, AT&T is offering dial-up service for customers to connect with the Internet, and at least one cable TV company is planning to offer telephone service. Other cable systems offer high-speed Internet connec tions over special cable modems. Some experts argue that the home PC and the Internet are the only technology capable of providing multimedia services (ex cept interactive TV) in the next few years. It will be several years until the digi tal convergence scene becomes clear. Hypertext: The Engine for Multimedia?
Most texts that we read, including this book, are sequential and flat. You might be able to use the index to look for a particular term that is not clear, but in general you are constrained by the sequential nature of the medium. Hypertext is nonsequential. If you are reading about a soccer game and come to a passage where it mentions an off-sides penalty, and that term is highlighted, you could click the mouse on it and open up a window that would explain the off-side rules. You might be able to click on a word in the rules to call up a diagram of a soccer field showing typical off-sides violations. In hypertext, sections of text have links to other pieces of text. The links are pointers, just as we saw with direct-access files. Now, instead of pointing to a par ticular record in a file, the pointer must reference a piece of text that is also stored in the system. To see what hypertext markup language (HTML) looks like, access a page on your browser and then click "view" and "source." You should be able to decipher some of the HTML code that tells the browser how to format what you see in normal mode on your screen. In Chapter 12 we discussed the Internet and the protocol of the World Wide Web, hypertext transfer protocol (http). Each web page has a URL or universal re source locator; the URL is a pointer to a page. Figure 21-8 shows how your PC can point to my home page. My home page links to a series of other pages de scribing publications, books in progress, research projects, and courses. It does not
CHAPTER 21 : ORGANIZATION SUPPORT SYSTEMS: DSSs, GDSSs, EISs, G ROUPWARE, AND MULTIMEDIA
589
To and from other links
. . . . .........
http://www.stern.nyu.edu/- hlucas/
http://www.stern.
http://www.stern.nyu.edu/-hlucas/b1 4hom.html
Your PC
http://www.stern.nyu.edu/-hlucas/valpref. html
http://www.stern.nyu.edu/-hlucas/b231 4s97.html
FIGURE 2 1 ·8
An example of URL links.
matter on which computer each of these pages is located; they appear on your computer as requested. A computer called a domain name server looks up the URL and translates it to a number that identifies the computer on which the reo quested page resides. The beauty of this protocol is that the user does not have to know the location of a computer or even very many URLs. By convention, one's home page begins with a tilda (-) in front of the user's name. So my home page is http://www.stern.nyu.edu/-hlucas. Convention also has it that the browser first looks in a directory called public_html for a hypertext file labeled "index.html." If my home page is called index.html and stored in my user directory public_html, then anyone on the Web can access it easily. Hypertext is used for documentation, user manuals, advertisements, and cus tomer guides. The Soft-Ad Group produced a number of hypertext ads for auto mobile manufacturers such as Ford, Buick, and BMW. These ads use hypertext so the viewer can move around and select different parts of the presentation. For ex ample, you might first be asked to choose which model car you want to explore and then be given a choice of statistics, engine and drive train, performance, and so on. Each choice brings up a display and the option to choose another display
590
PART FIVE: EXCITING D I RECTIONS IN SYSTEMS
that provides more information on part of what is currently viewed. The price list of various options is followed by a spreadsheet in which you choose the options you want and come up with a total price for the car. The London Design Museum has a hypertext information system for its visitors. The user can access informa tion about various design movements, or they can see information organized by country or manufacturer. You can also access information about individual design ers or products. Hypertext provides the user with the ability to navigate through a variety of ma terial. If this navigation includes different media, hypertext offers a natural vehicle for constructing multimedia applications. Hypertext, then, is one possible model for the overall control of multimedia applications. CHAPTER SUMMARY
1. The systems in this chapter offer a stark contrast to transactions processing applications as they directly support the efforts of the knowledge worker. 2. Decision-support systems are the oldest systems in this group. They help a de cision maker solve problems. 3. A DSS may supply its users with statistics and analysis, or it may be based on some kind of operations research model as we saw in the examples from American Airlines and Air Products and Chemicals. 4. An EIS is designed for a top-level manager. Its objective is to provide the in formation this executive finds personally relevant. 5. A good EIS has a graphical user interface and allows the user to drill down to lower levels of detail to understand the results displayed. 6. A group DSS provides support for a group of decision makers working together on a problem. The GDSS may be used remotely or at a specially constructed meeting room featuring a facilitator and technology to support the meeting. 7. Groupware is a product that epitomizes the transformation of the computer from a purely calculating device to a communications medium. Groupware as sists individuals faced with a common task in a shared environment. 8. Communications are important for coordination and for assuring that individu als are working for the objectives of the organization and for resolving depen dencies. Groupware fulfills an important coordinating role in the organization. 9. Lotus Notes, the most successful groupware product, also features an applica tions development facility. Many users are developing quite sophisticated ap plications with it. 10. Groupware is also a repository of organizational intelligence, as we saw with a consulting firm that uses it to keep track of its past engagements and the skills of its staff. 11. Multimedia refers to the combination of various media like audio and video. It is used for education and entertainment as well as by corporations to help present their products. 12. Multimedia has generated tremendous interest, but it is not easy to develop multimedia presentations.
CHAPTER 21 : ORGANIZATION SUPPORT SYSTEMS: DSSs, GDSSs, EISs, GROUPWARE, AND MULTIMEDIA
13. Digital convergence refers to the pipeline carrying information into the home. Various content providers and communications companies are all trying to fig ure out how to control the pipeline and what comes through it. 14. The consumer demand for digital convergence, especially in the form of inter active TV or the ability to choose among 500 channels, is not clear at this point. 15. As a manager, you may find multimedia most valuable for training employees, video conferencing and meeting support, providing information to employees and customers, and similar tasks. IMPLICATIONS FOR MANAGEMENT
Groupware is one of those exciting applications that seems to happen about once every ten years. It has the potential to fundamentally change the way we do busi ness. There are two aspects of this class of software that really stand out. The first is the most obvious, allowing people to work on a shared task while located in dif ferent places. The second, and potentially the more important, is the use of group ware to collect and disseminate organizational knowledge. You might think of the Notes database developed by a worldwide consulting firm as an intelligent system, making the experience of the firm available to others. What other kinds of organi zations could benefit from this kind of knowledge base? KEY WORDS
Compression Decision-support system (DSS) Digital convergence Executive information system (EIS) Group decision-support system (GDSS) Groupware Hypermedia Hypertext Links Multimedia Notes Optimization Pointers WebTV RECOMMENDED READING Ciborra, C. GroupWare & Teamwork. New York: John Wiley & Sons, 1997. (A casebook featuring actual examples of groupware in different business sectors.) Nielsen, J. Hypertext and Hypermedia. New York: Academic Press, 1990. (An excellent introduction to hypertext by one of the leaders in the field.)
59 1
592
PART FIVE: EXCITING D I RECTIONS IN SYSTEMS
O' Keefe, R; and T. McEachern. "Web-Based Customer Decision Support Systems," Com munications of the ACM. 4 1 , no. 3 (March 1998), pp. 7 1-78. (A practical article con necting DSS to the Web technology.) Smith, B. C.; J. Leimkuhler; and R Darrow. "Yield Management at American Airlines," Interfaces. 22, no. 1 (January-February 1992), pp. 8-3 1 . (A detailed description of the DSS discussed in this chapter.) Smith, C. Computer-Supported Decision Making: Meeting the Decision Demands of Mod ern Organizations. Norwood, NJ: Ablex Publishing, 1998. (This outstanding textbook emphasizes the need for computer-driven decision making in modern organizations.) Sprague, R; and H. Watson, Decision Support for Management, Upper Saddle River, NJ: Prentice-Hall, 1996. (A book devoted to many of the topics covered in this chapter.) Stohr, E.; and B. Konsynski (eds.). Information Systems and Decision Processes. Los Alamitos, CA: IEEE Computer Society Press, 1992. (An excellent collection of articles on organizational support systems by some of the leaders in the field.) Szuprowicz, B. Multimedia Tools for Managers. New York: AMACOM Publishing, 1996. (This book provides a useful guideline for managers on how to take advantage of multi media to gain competitive advantages.)
DISCUSSION QUESTIONS 1. What
is a decision-support system? How does a DSS differ from a traditional system? 3. How does a DSS involve users in its design? 4. For what types of systems might the user need assistance in building a DSS? (Hint: Consider Alter' s framework.) 5. How are electronic spreadsheet packages used on a PC for building a DSS? 6. What kind of DSS is a manager most likely to build, a model-based or data-based sys tern? Why? 7. Why is an EIS likely to be data based as opposed to model based? 8. What are the objectives of group decision-support systems? How do they differ from an individual DSS? 9. What do graphics capabilities contribute to a DSS? 10. Should users actually write programs? Is building a DSS programming? 11. How does prototyping contribute to a DSS? 12. What are the pros and cons of electronic meeting rooms as a DSS? 13. What is the role of a model in a model-based DSS? 14. Why do managers want to be able to change values and run a DSS again? 15. What features distinguish an executive information system from a DSS? 16. What is a drill down facility and why is it important for an EIS? 17. How has technology changed the costlbenefit ratio for these decision-support systems since the early ones developed in the late 1960s? 18. Why have information services departments generally not developed decision-support systems? Why do they seem to concern themselves with transactions processing applications? 19. What are the major applications for multimedia presentations? 20. What is digital convergence? 21. Who are the major players in digital convergence? 22. What is the promise (and the mythology) of digital convergence? 23. How can a company use multimedia today? 2.
CHAPTER 2 1 : ORGANIZATION SUPPORT SYSTEMS: DSSs, GDSSs, EISs, GROUPWARE, AND MULTIMEDIA
24. What is
hypertext and what is it used for? What is groupware? What kinds of problems does it address? 26. What is Lotus Notes? What features does it provide? 27. How does groupware contribute to coordination within the organization? 28. How does groupware provide a base for organizational knowledge? 29. How would you align the incentive (pay) system for an organization to encourage the use of groupware? 30. Compare and contrast groupware, the Internet, and WWW . 25.
CHAPTER 21 PROJECT
A Decision-Sup port System Mary Simon is looking for help in a recurring decision she faces. When helping a client evaluate a business for purchase or merger, she analyzes a great deal of in formation from the balance sheet of the firm. In addition, she does a competitive analysis by looking at other firms in the industry to see how the potential acquisi tion is performing. Sometimes she is looking for a leader. In other cases, she wants a firm that is not doing well but has a lot of potential. Describe the overall design of a system for Mary. How do you think it should be developed? What kind of computer and what language or package would you recommend? How much will Mary have to know to use the DSS? What role will she have in building it? Can you use any of the PC tools you have learned to build a rough prototype for Mary?
593
CHAPTER 22
I
l l ige
Outline Artificial Intelligence
AI versus Traditional Programs Expert Systems: Applied AI
Components of Expert Systems Knowledge Representation The Inference Engine Systems Development Four Examples Knowledge Discovery Neural Networks
Case-Based Reasoning Genetic Algorithms Intelligent Agents
Focus on Change
The systems described in this chapter have the potential to change the organization by capturing and applying human expert knowledge and making it available to others in the firm. When first developed, some observers thought expert systems would dramatically change the world of computing. To date, these systems have not lived up to their potential. What are the reasons for this shortfall? How can in telligent systems lead to competitive advantage and organizational transformation? 594
CHAPTER 22: INTELLIGENT SYSTEMS
ARTIFICIAL INTELLIGENCE
Expert systems, case-based reasoning, neural networks, and genetic algorithms represent an applied branch of the computer science field of artificial intelligence (AI). Workers in AI try to develop machines and programs whose behavior might be considered intelligent if viewed by humans. At what activities are humans very good? Men and women are able to learn from experience, they can make sense out of contradictions, and they can reason to come to a conclusion. People are also able to reason inductively-to look at evidence and generate a hypothesis . about the process that generated the evidence. Can a machine do any of these things? Certainly, there is no one machine that can do them all. In looking at AI systems, we must consider their domain-the area in which the system functions. A program to diagnose tumors may work very well with tumor information, but it would be hopelessly lost if asked about viral infections. How can we agree that a program or device exhibits intelligent behavior? Alan Turing, a British mathematician, proposed a test that is named after him. Turing's test is to place a computer and a human in two separate rooms. An interviewer in a third room, who cannot see the human or the computer user, asks questions that are passed to the computer and to the human. If the interviewer cannot tell the dif ference between the answers from the computer and the human, the machine is said to exhibit intelligent behavior. AI versus Traditional Programs
Just as the goals of AI programming differ from those of a conventional informa tion processing system, so do the characteristics of these programs. First and most important, in Al one is manipulating symbols rather than numbers. A program to diagnose diseases does not need to compute arithmetic expressions. Instead it has to manipulate logical symbols, just as someone solving a geometry problem would manipulate symbols rather than numbers. It is also claimed that AI programs are nonalgorithmic. An algorithm is defined as an effective procedure for solving a problem. If the algorithm is followed, one is usually guaranteed of finding a solution to the problem. As opposed to algorith mic programming, AI programs often employ heuristics or "rules of thumb" for finding problem solutions. Many AI programs are concerned with pattern recognition. In fact, some of the early work in AI is responsible for successful optical-scanning devices since these devices must read input symbols and match them with patterns already in the scanning device to identify the input. Pattern matching is an important human ca pability. We are able to make sense out of many varied patterns.
EXPERT SYSTEMS: APPLIED AI
Currently, there are few applications in business that a computer scientist would call AI. Instead, organizations take advantage of an applied branch of artificial
595
596
PART FIVE: EXCITING DIRECTIONS IN SYSTEMS
intelligence called expert systems (ESs)-advisory programs that attempt to imitate the reasoning process of human experts (Turban, 1 995). Why build such systems? One purpose is to make the expertise of an individual available to others in the field. One company built an expert system to help diag nose and solve the problem of oil exploration rig drills getting stuck. The knowl edge of the firm's best drilling expert became available on all rigs through the ex pert system. Another motivation for creating an expert system is to capture knowledge from an expert who is likely to be unavailable in the future, perhaps because of an im pending retirement. An expert system also provides for some consistency in deci sion making. Imagine a brokerage house in which the compliance department must see that brokers follow the firm's and the SEC's rules. If the firm uses an ex pert system to help advise its analysts, each case of suspected rule violations will be evaluated consistently. How is this kind of knowledge discovery different from the knowledge bases one can build with a groupware application such as Lotus Notes? Both kinds of applications have the same goals. The groupware solution does simple searches on word matches. Expert systems feature more sophisticated approaches to search; they can discover new patterns and relationships in the data, something that a search on keywords is unable to do.
Most business school finance and econom ics faculty members have an abiding faith in the efficient capital markets hypothesis. This hypothesis states that the market re flects all information and that securities prices are therefore random. Having past prices and new information does not let you predict future stock prices. Markets are considered to be very efficient processors of information so that people in the market react instantaneously to information; the market has discounted information and re flected it in the price of a secu rity before you can move. One economist argues that it might be possible to get an edge because the efficient capital markets hypotheses was developed during the days when there was ample time for information about a stock to be absorbed by traders and reflected in the price. Today networks deluge traders with huge amounts of information, more than a person can digest. It
is hard to believe that all this information is re flected in the price at every instant. Two physicists who have done research on complex systems have started a com pany called Prediction that is trying to find hidden patterns to predict stock prices. The company uses AI software to analyze mar ket and financial data; it sends trading sig nals to its partner, the Swiss Bank Corpora tion, which places bets on the movements of foreign exchange rates, interest rates, and stock and commodity prices. Some of the company's programs use neural nets while others use genetic algorithms. If the company is doing well, according to the efficient markets hypotheses, it could be a matter of luck; if the markets are random, you will guess right some of the time. How much success would Prediction need to con vince you that an expert system is better at predicting the market than other techniques, or that the market is not a random walk?
CHAPTER 22: INTELLIGENT SYSTEMS
Components of Expert Systems
An expert system consists of the following components: • • •
The user interface The knowledge base The inference engine
In our research, we found the user interface to be an extremely important compo nent of an expert system. Possibly because users are not accustomed to systems that provide advice, they are more demanding. Also, if the advisory system is used fre quently, it becomes an important part of the user's daily activities. A good interface makes the system much more pleasant to use and helps promote its acceptance. What is a knowledge base? How does it differ from a database? One important way to represent an expert's knowledge is through the use of rules. An example of a rule might be as follows: IF the broker sold stock in an account on one day
AND bought the same stock for the same account the next day, THEN investigate the transaction p 10 =
This hypothetical rule indicates that the probability of an investigation is to be in creased if the broker sold stock one day and bought it back the next. The broker might be trying to generate commissions when there was no valid investment rea son for the transactions. A database stores numbers and symbols. It might show a simple relationship among the data because they are stored together or defined as connected in some way. A rule in a knowledge base, however, contains some of the logic of an appli cation. The rule above implies something about when an investigation should be undertaken. An ordinary database makes it very difficult to figure out the logic of the application. A knowledge base contains more information about logic than a conventional database. Knowledge Representation
The production rule above is an example of one type of knowledge representation. It is one of the most popular for building expert systems in business. Another rep resentation technique is known as a frame. The frame provides a way to gather a lot of information about an object into one place. For an expert system to advise us on what personal computer to buy, a frame might contain the characteristics of each PC, including its memory size, the type of chip, the speed of the chip, the type of video board, the monitor, and so on. Finally, an expert system can use a semantic network. In a network, informa tion is connected through a series of nodes. The program traverses the nodes along the paths of the network when it is seeking information for its computations. The Inference Engine
The inference engine is the reasoning part of the expert system. It is one of the major components of an expert system's shell, a program that is designed to facilitate
597
598
PART FIVE: EXCITING DIRECTIONS IN SYSTEMS
the development of an expert system. Many of these shells are designed for personal computers, and typically they work through production rules. The inference engine examines the rules and tries to find rules with true IF conditions. A true rule then "fires" and performs the action indicated in the THEN clause. The inference engine may employ forward or backward chaining. An example will help illustrate how the inference engine might work (Luconi, Malone, and Morton, 1986). Figure 22-1 contains several production rules for per sonal financial planning. Suppose the client's tax bracket is 33 percent and her li quidity is more than $ l OO,OOO and our client has a high tolerance for risk. For ward chaining involves going through the rules one at a time to infer that exploratory oil and gas investments are the best recommendation. If we are interested only in whether exploratory oil and gas investments are the best recommendations and we are not interested in other possible invest ments, backward chaining is more efficient. In backward chaining, the system begins with a goal. In this case, the goal is to show that the client needs ex ploratory oil and gas investments. At each stage, the inference engine establishes subgoals that, if achieved, would indicate the client needs exploratory oil and gas investments. Looking at Figure 22- 1 , assume we know that the THEN condition of the third rule is our goal. To conclude that the exploratory shelter is recommended, we need to know that risk tolerance is high (which is already known) and we need a rule to show that a shelter is recommended. By checking other rules, the infer ence engine finds if rule I is true, it can achieve its subgoal of having a shelter recommended. The IF conditions of rule I are true, so the subgoal is attained and rule 3 is true. Systems Development
The development of an ES follows much the same process as recommended for a DSS in the previous chapter. Expert-system development lends itself naturally to prototyping and learning through test cases. Sometimes the individual designing the system is called a "knowledge engineer" to distinguish him or her from a tra ditional systems analyst. The development process is different because advice is far more tentative than the numeric solution of a problem or the processing of transactions. We should point out, however, how difficult it can be to conduct knowledge en gineering. In the AESOP example presented below, many hours were spent in meetings with the expert, and many meetings were canceled because of his sched ule. It was not until the meetings moved to the floor of the American Stock Ex change just after the close of trading that we managed to make progress on the system. The expert is extremely knowledgeable, and it was difficult for him to ex plain his logic because he was not conscious of his decision-making steps. In some instances, experts are reluctant to reveal their expertise to systems de velopers. In many cases, systems are developed as an experiment and are never fully implemented. The kind of systems described in this chapter may be some of the most difficult to implement successfully.
CHAPTER 22: INTELLIGENT SYSTEMS
FIGURE 22·1
Expert system example.
599
600
PART FIVE: EXCITING DI RECTIONS IN SYSTEMS
Four Examples
Internist-l One of the earliest and best-known expert systems was developed to provide physicians with a consultant on internal medicine. See Figure 22-2 for a dialog with this system, which is called Internist- I . Professor Harry Pople and Dr. Jack Meyers at the University of Pittsburgh developed the program and built the knowledge base. The system covers about 80 percent of internal medi cine and has knowledge of some 500 diseases and 3500 manifestations of the diseases. The Authorizer's Assistant American Express developed an expert system called the Authorizer's Assistant. Between 200 and 300 authorizers work for American Express at four U.S. centers. They have the responsibility of authorizing transactions charged to American Express cards while the customer is in the store waiting for the sales transaction to be completed. The cost of making a wrong decision is high. A refusal might alienate a cus tomer or cause him or her to use a different card. American Express would also lose the discount it charges the merchant for processing the transaction. If credit is approved and American Express cannot collect the funds from its cardholder, it has lost the money. Losses from unpaid bills are estimated to be in the hundreds of millions of dollars per year at American Express. Some 95 percent of the authorizations are approved automatically by a comput erized system following set statistical algorithms. Remaining requests are routed to authorizers. Before the Authorizer's Assistant was developed, the human autho rizer would receive a screen of data and then access more than a dozen separate database records to synthesize the information needed for a decision. The Authorizer's Assistant expert system contains about 800 rules, some for combining data and others for making recommendations. The authorizers see a single screen with an accept/reject recommendation and the data on which the rec ommendation is based. The human still makes the final decision. The company claims a 20 percent increase in the productivity of its authoriz ers as a result of the system and expects the system to pay for itself in less than two years. We should note that the user interface provided by the expert system greatly simplified the presentation of information to the human authorizer, demonstrating the importance of the interface in ES design. AESOP: A System for Stock Options Pricing Background A stock option is a security giving the holder the right to buy or sell an asset at a specified time. A stock option call is the right to buy a share of stock at a certain price at a future date; a put is the right to sell a share of stock. The price at which one may purchase or sell the stock is called the strike price. On the American Stock Exchange (AMEX), options have an expiration date, at which time they may be exercised. A position in an option may be closed out by purchas ing an offsetting contract. All options expire on the third Friday of the month of exercise.
CHAPTER 22: INTELLIGENT SYSTEMS
FIGURE
22·2
An example of a session with I nternist-1 .
(continued)
601
602
PART FIVE: EXCITING DI RECTIONS IN SYSTEMS
FIGURE 22-2-CONTINUED
CHAPTER 22: INTELLIGENT SYSTEMS
FIGURE 22·2
(continued)
603
604
PART FIVE: EXCITING DI RECTIONS IN SYSTEMS
FIGURE 22·2-CONTINUED
CHAPTER 22: INTELLIGENT SYSTEMS
TABLE
22·1
AN EXAMPLE OF A CALL OPTION
XYZ Calis Stclck Price $42
May June
40 Bid 3 5/8 4 1 /8
Ask 3 7/8 4 3/8
45 Bid 0 5/1 6 o 1 3/1 6
Ask 0 4/8 1 0/8
50 Bid 0 0/8 0 0/8
Ask 0 1 /8 0 1 /8
Table 22-1 is an example of a calll option for XYZ stock. The price of a May option to buy a share of XYZ at $40 (the "ask" price) is $3Ys. (Options below $3 are priced in one-sixteenths, and above $3 are priced in one-eighths.) The "bid" price for the May 40 is $3%. The quote for the May 50 call option is "no bid," one eighth asked. The price is given for an option to buy or sell one share of the stock; however, contracts on the AMEX are for 100 shares. An option for a stock at a cer tain strike price is called an options series. Assume that the current price of a share of XYZ is $42. A May 40 call is said to be "in the money" because, if the stock price holds until expiration, an option owner has the right to buy a share for $40 and can sell it immediately for $42. The May 45 and 50 calls are "out of the money." For puts, the opposite logic holds. A May 40 put is out of the money because, if the $42 stock price holds until the op tion expires, there is no gain from having the right to sell a share of stock at $40 when the market price is $42. The May 45 and May 50 puts are in the money. The Specialist The options specialist is a market maker in an option. He or she is responsible for posting the bid and asking quotes for the stock option at the op tions post on the floor of the exchange. There is only one specialist on the ex change for each stock option. The specialist maintains an inventory of options and can trade from his or her own account. Specialists also maintain a position in the underlying stock as a hedge on their inventory of options. The role of the specialist is to ensure a fair and orderly market. The specialist buys and sells from his own account to prevent price changes from being unduly erratic. If the specialist posts an incorrect price, he or she does not obtain the maximum return on invested capital and runs the risk of incurring a large loss. Investors, not ing a discrepancy between the price of the option and the underlying stock, will arbitrage against the specialist. Errors in pricing provide the investor with an op portunity for nearly risk-free profits. (The specialist's exposure is limited because a public quote is good for only a limited number of contracts.) An important role of the specialist is to represent limit orders. The limit order is a bid to buy or sell an option at a particular price. The specialist is responsible for executing a trade for the limit order when the option price reaches the price on the limit order, assuming that the specialist has a customer who will take the other side of the trade or that he or she will handle the trade from inventory.
605
606
PART FIVE: EXCITING DIRECTIONS IN SYSTEMS
For example, assume the specialist has a customer who puts in a limit order to buy at 4% and the current bid price for the option is 4%. The specialist can lower his quotation so that the public bid price is 4%. However, he cannot lower it to 4Ys because he holds a limit order from a buyer willing to pay 4%. The specialist involved in this project used the Black-Scholes options-pricing model for a number of years and was reluctant to change models. The specialist provides the parameters for the model. His most frequent change is in the underly ing stock price. The stock for his options is traded on the New York Stock Ex change, and the monitor at his post displays the bid and ask prices as well as the last sale price of the underlying stock at the NYSE. The specialist also changes the interest rate for the model and inputs new volatilities for the stock. The output of the Black-Scholes model is of invaluable assistance to the spe cialist. Because of the assumptions of the model and the unique situation of the specialist, however, the specialist must modify the theoretical prices. The problem domain of the specialist requires that he or she take the following constraints into consideration when pricing: 1. The model outputs point estimates, and the specialist must put a bid/ask spread around the theoretical price. (The specialist has a desired spread, which is one of his decision variables. The stock exchange also has guidelines for spreads that are a constraint on the decision process.) 2. The specialist cannot price through limit orders. He must constantly check his book of limit orders. 3. There are a number of exchange rules that apply to pricing. For example, on the maximum spread allowed between bid and ask prices, the requirement to price is one-sixteenth below $3Ys above. 4. The specialist's own inventory position in a series must be considered. 5. The possibility that certain quotations when combined provide an opportunity for someone to arbitrage against the specialist. (The theoretical price prevents arbitrage, but some of the constraints cited in this section force the specialist to post prices that differ from the theoretical price and therefore create oppor tunities for arbitrage.) 6. The level of current trading activity in the option is also considered.
The Expert System AESOP integrates the Black-Scholes mathematical model with an expert system and attempts to provide recommended quotations for the specialist that are closer to what he or she can post than the theoretical prices pro duced by the mathematical model alone. The AMEX sponsored the development of the system with a research grant. Its objective was to assess the use of expert systems technology at the exchange. A major goal of this project was to show that such a model could succeed in the challenging environment of a stock ex change floor. Many expert systems are advisory and operate with loose time constraints. The options-pricing specialist must function in close to real-time as the market changes. AESOP would have to function on the floor of the exchange and provide
CHAPTER 22: INTELLIGENT SYSTEMS
recommendations whenever the specialist changed input parameters. The recom mended prices would have to appear quickly enough to be posted to the public quote board before a trader could take advantage of an "old" price. The expert system was developed over a two-year period with a senior options specialist at the AMEX as the human expert. The ES uses rules to represent the knowledge of the specialist. This pmticular approach to knowledge representation seemed natural given the environment. The American Stock Exchange has a series of rules that apply to options prices. The heuristics used by the expert specialist also seemed to follow an if-then structure: "If I am long on contracts, then reduce the asking price by one increment." Figure 22-3 presents an overview of the AESOP system. The specialist inter acts with the system through the u ser interface managed by AESOP's control module. When the user changes any parameter, the control module invokes the Black-Scholes mathematical model to generate theoretical prices for each series. If the specialist has four different strike prices for each month for four months for both puts and calls, there are 32 theoretical values to be computed (four strikes x four months for puts and calls). The expert always considers the spe cialist's desired spreads (the difference between bid and ask prices) and always applies the specialist's rounding rules (public quotations must be stated in six teenths and eighths of a dollar). If the specialist's position in any series exceeds a threshold level, the expert model adjusts the price of that option to encourage (specialist is long) or discourage
FIGURE
22·3
The AESOP model.
Symbolic model
III III
� � III III
Spreads Rounding Position Limit orders AMEX rules Arbitrage
607
608
PART FIVE: EXCITING DIRECTIONS IN SYSTEMS
(specialist is short) trading. The symbolic model also looks for limit orders and ad justs the bid/ask prices based on the presence of these orders. Limit order adjust ments are the most complicated and potentially the most valuable feature of the symbolic model. The expert system always checks the AMEX rules to be sure exchange regula tions are not violated. The model also scans for arbitrage possibilities. In almost all cases, arbitrage arises because bid/ask prices are adjusted away from the theo retical price for some reason, most often because of the presence of a limit order. The user interface presents the recommended quotations of the symbolic model along with the theoretical prices generated by the mathematical model. The user is free to override any recommendations, ask for an explanation or trace of the sym bolic model, and/or change parameters and rerun the entire system. Figure 22-4 is a print of the main AESOP screen, which has color coding and pop-up windows as a part of the interface. The user activates the menu by using the function keys shown at the bottom of Figure 22-4. The user interface provides the following functions: • Entering and processing limit orders • Invoking a system for updating contracts, positions, etc.
FIGURE 22·4
The main AESOP screen.
CHAPTER 22: INTELLIGENT SYSTEMS
• Changing parameters in the Black-Scholes model or bid/ask spreads • Explaining the reasoning behind each recommended quotation and alerting the user to arbitrage possibilities • Manually overriding any recommended price • Posting recommended quotations to the "Current Board" columns on the screen • Displaying the position or changing the threshold position for position rules to apply • Turning a log on or off • Running the Black-Scholes model
A specialist used AESOP on an experimental basis for two months. Figure 22-5 compares AESOP's recommendations with the actual quotes posted by the spe cialist for calls with an ask price in eighths. The graph presents the number of times the specialist posted what AESOP recommended (the "=" column in Figure 22-5) and a distribution for the number of increments by which the spe cialist's and AESOP' s quotes differed. As an example, Figure 22-5 shows that 269 times the specialist posted the ask price in eighths recommended by AESOP; 1 5 1 times the specialist raised the recommended bid by one-eighth, and 256 times he lowered it by one-eighth. Further analysis of puts and calls showed that AESOP performs best on calls. There is more trading activity in calls than in puts. AESOP also performs better on eighths than sixteenths, which seems reasonable as it is more difficult to select the "right price" out of sixteen increments than out of eight. It appears AESOP
FIGURE 22·5
Calls ask price in eighths.
609
61 0
PART FIVE: EXCITING D I R ECTIONS IN SYSTEMS
is successful, demonstrating that an expert system can improve the ease of use of a mathematical model and that it can do so in a demanding, semi-real-time environment. The Port of Singapore Authority Singapore has long had government policies promoting economic growth and employment. Since trade is vital to Singapore's economy, applying technology to processing trade-related information was a natu ral choice. In addition, Singapore knew that its main rival as a port, Hong Kong, was developing an EDI system for trade. Trade involves many entities in Singa pore, so the effort to reengineer trade information processing included representa tives of the Economic Development Board (EDB), the National Computer Board (NCB), the Trade Development Board (TDB), and various statutory boards in volved with trade such as customs, the Port of Singapore Authority (PSA), and the Civil Aviation Authority. It was clear that automating present procedures and documents would produce few gains: It was necessary to reduce the 20 plus forms involved in trade to a few forms, or even one. The design effort for TradeNet resulted in a single, long, for matted computer screen to serve nearly all trade documentation for Singapore. The development effort led to the creation of Singapore Network Services (SNI), which established its EDI system. SNI purchased a mainframe EDI "engine" from IBM to serve as the core of the trade system; a local Singapore firm wrote, for ex ample, the custom interfaces and monitoring and billing subsystems. Other sub contractors developed the user interface software for the trading companies that would use TradeNet (King and Konsynski, 1994). The TradeNet EDI system links the TDB, customs, shipping agents, the ports, freight forwarders, traders, and others. When implemented in January of 1 989, the $10 million plus system was a tremendous success. Customer response was much greater than anticipated, and by 1991 the use of TradeNet had become mandatory. Several freight forwarders reported savings of 25 percent or more when handling trade documentation. An evaluation of TradeNet showed that the TDB staff han dling trade documentation and procedures fell from 144 before the system to 38 afterward. After the system, turnaround time for documents that took two days under manual processing dropped to 15 minutes while documents that used to re quire four days now normally take four hours (Teo, Tan, and Wei, 1 994).
At the Port TradeNet has greatly facilitated document processing at the port, and it has reduced time delays for most of the parties that use it. Port operations, on the other hand, impose severe, real-time requirements on information pro cessing. The objective of outstanding customer service, which is measured by minimum ship turnaround time and error-free container handling, imposes sig nificant constraints on information processing and port operations. PSA, in com bination with various partners, developed an integrated set of traditional and ex pert systems to provide exceptional customer service to shipping lines. It is estimated that there are more than 300 applications used in all facets of the
CHAPTER 22: INTELLIGENT SYSTEMS
MrAN�tt�$ T�.wN&ti!m: � �
FIGURE 22·6
Technology from the Port of Singapore Authority.
Port's operations (Tung and Turban, 1 996). There are two major systems and many subsystems that allow the port to provide superb service despite the short age of land area for storing and moving containers. See Figure 22-6 and the PSA web site for more details. PortNet and MAINS Two major systems provide information to port customers and PSA staff. The first system is PortNet, which is a nationwide system connect ing PSA to users; it is linked to TradeNet. Prior to the arrival of a ship, shippers use PortNet, an online system with about 1500 subscribers to notify the Port Au thority of the containers to be loaded. In response, PSA provides a window of time when the shipper's trucks should appear at an entry gate to the Port. The objective is to have trucks go to the right stack of containers and to have a yard crane avail able to offload the container from the truck. Such scheduling minimizes the need to handle containers. The second system is Maritime Information System (MAIN), which collects data from shipping agents, shippers, truckers and others about, for example, a ves sel's contents, schedule, and cargo, and provides a central database of information that other systems can access (Tung and Turban, 1996). CITOS The Computer Integrated Terminal Operations System (CITOS) sup ports planning and management for all operations of the port. The subsystems in CITOS process information for allocating berths to ships, planning the stowage of containers, allocating resources in general, reading container numbers, and op erating trucking gates. The first prototype of CITOS appeared in 1988; it was converted to a production system in 1 989, and won an Artificial Intelligence
61 1
61 2
PART FIVE: EXCITING DIRECTIONS IN SYSTEMS
Innovation Award shortly thereafter. There are five subsystems: berth allocation, stowage planning, yard planning, resource allocation, and a neural network appli cation for gate automation. 1. Berth planning. The assignment of ships to berths is complex, given the large
2.
3.
4.
5.
number of ships handled daily (40 or more), priorities, weather constraints, changes in schedules, and the need to allocate resources like quay cranes. The expert system relaxes some of the problem's constraints by using differ ent heuristics. The system provides about 80 percent of the solution, and planners use it as a starting point, using a graphical user interface to drag and drop vessel icons in different berths. The system reduces the planning time by up to 90 percent and has improved the utilization of berths (Tung and Tur ban, 1996). (PSA has not put this system into operation.) Stowage planning. The planner assigns containers to cranes and to bays on a ship and determines the containers to be removed and loaded. Each ship is dif ferent and has a unique template showing its holds and the locations of con tainers. Planners must balance the load on the quay cranes according to safety and ship balance constraints. (There are 20 to 30 berths and 10 quay cranes.) The design team first built a prototype using TI (Texas Instruments) Explorer; after proof of concept, they developed the system for a Sun system using Ob jective C and LISP. This problem is complex because ships typically carry cargo for several destinations, and it is important to minimize handling by loading containers in the right sequence. As an example, one of the new large container ships, the 6600 TEU (twenty-foot equivalent containers) Sally Maersk, recently made her maiden voyage to Singapore. PSA achieved a rate of 203 con tainer moves per hour for this vessel, exceeding its 1 997 average of 88 moves per hour (the fastest in the world). The Port handled 1 700 boxes and turned the ship around in less than 8.5 hours. The ship loaded containers from 44 other vessels and discharged containers to another 38 during her visit. Yard planning. Singapore is a small island with limited space. PSA stacks containers up to nine high, which is much higher than other ports with more land. Retrieving a container on the bottom of a stack requires a lot of handling and time. Consequently, the yard planner must determine the placement of containers to support rapid turnaround of ships. The objectives are to use space efficiently and keep yard activities orderly. Resource allocation. This system helps deploy operations staff and container handling equipment with the exception of quay cranes. Users work with a graphical tool to produce a resource deployment plan. Employees insert their staff passes, which are smart cards, in a machine that provides them with instructions. Gate automation. As trucks carrying containers arrive at the entry gate to the port, the Container Number Recognition System reads and interprets the con tainer's number. The system uses a video camera for each letter and number of
CHAPTER 22: INTELLIGENT SYSTEMS
the I I-character container ID that is painted on each container. A neural net recognizes each character, and the system checks it against its record of the container that was expected. The gate automation subsystem also records the weight of the vehicle and directs the driver to the container's desired location within 45 seconds. This system reduced the number of individuals manually checking IDs from 16, one per lane, to 3. CIMOS The Computer-Integrated Marine Operations System (CIMOS) helps to manage shipping traffic and the activities of the port. It includes a Vessel Traffic Information Subsystem, which watches the Singapore Straits and its approaches. This information is available in a database that shippers access via PortNet to learn the status of vessels in the port. Planning Systems There are five expert systems used for planning, including ap plications to assign ships to anchorages, schedule the movement of vessels through channels to terminals, deploy pilots to tugs and launches, route launches, and deploy tugboats. 1. Vessel traffic I. This expert system provides surveillance of the port ap proaches including the Singapore Straits. It uses a computer-aided radar track ing system with five radar dishes in place. The system relays vessel movement information to a control center where it is displayed on high-resolution, color graphics terminals. 2. Vessel traffic II. The second vessel traffic system has four radar dishes to mon itor port waters. The information from this system is used to deploy pilots, tugs, and launches, and to assign anchorage space. 3. Port traffic management. This system provides a central database integrating all information from other subsystems. It is also linked to PortNet so that cus tomers and others can obtain status information. 4. Marine radio system. This system is installed on PSA vessels and transmits operational data using wireless technology. The system is installed on tugs and launches; all pilots carry radios. 5. Resource allocation planning systems. There are five expert systems that help plan resource allocations for the port: a. Anchorage utilization assigns anchorage slots to vessels according to the ship's characteristics. b. Channel utilization plans and schedules movements of container vessels calling at terminals (over 45,000 a year). c. Pilotage deployment assigns pilots to tugs and launches. d. Launch deployment produces routes for the launches that serve vessels and employees. e. Tug deployment allocates tugs to meet service demands.
This example from PSA shows the power of integrating expert systems technol ogy with more traditional applications. The Port has achieved impressive results that contribute to Singapore's overall strategy for trade and commerce.
61 3
61 4
PART FIVE: EXCITING DIRECTIONS IN SYSTEMS
KNOWLEDGE DISCOVERY
Knowledge discovery is an area of active research and application; it combines AI techniques with large databases. In Chapter 10 we discussed data warehouses, which contain data stored according to multiple dimensions. If you combine the resources of a very large database with AI-based knowledge discovery programs, you may be able to learn valuable facts from the data. For example, suppose that you had a database of the credit card charges for thousands or even millions of card users. A knowledge discovery program would look for patterns in the data and report the results to the user. One pattern might include young professionals with an income over $50,000 who eat out at least once a week. You might target this group for a special restaurant promotion. Today transactions systems routinely generate billions of characters of data. Credit card charges are one example, but they are small compared with the data generated by grocery and retail store scanners each day. Someday a marketing ana lyst may be able to work with knowledge discovery programs and a large database to generate hypotheses about products and markets as he or she develops a market ing plan. The combination of AI and database technologies has a great deal of po tential for extracting useful information from massive amounts of transactions data. NEURAL NETWORKS
The field of neural networks has recently received a great deal of attention. This approach to AI was first suggested many years ago but has only recently become fashionable. The first neural networks were loosely based on how the brain func tions. The brain consists of neurons, which can be thought of as small processing units. Outside stimuli or other neurons provide input for a given neuron. The neu rons are connected in a large complex network.
CHAPTER 22: INTELLIGENT SYSTEMS
The network has dendrites, which transmit messages across various paths. The dendrites are like highways connecting the network. A synapse exists where the network connects with a particular neuron. There can be many dendrites (thou sands) leading to a single neuron. In the brain the neurons function through a chemical or electrical impulse. These impulses can either excite the neuron, which then "fires," sending a message across the network, or the impulses can inhibit a neuron so it cannot fire. This output goes across a single axon that transmits the neuron's signal to the network. It is estimated that there are trillions of neurons in the human brain (Zahedi, 1993). How does the analogy of the human brain help create an AI program? The most popular type of neural network is used to classify input into different categories. Figure 22-7 shows the basic building blocks for a neural network: neuron i con nected to neuron j. The weight Wij represents the strength of the connection be tween the two neurons. In a neural network, there are at least two layers of neu rons. The input layer receives input from the external environment. The output layer consists of neurons that communicate the output of the system to the user. Figure 22-8 shows a neural network consisting of three layers. The input to a neuron consists of a weighted sum of all the neurons connected to it that fired. For example, in Figure 22-8 the input to neuron x consists of the output from neurons a, b, and c (assuming that they fired) multiplied by their re spective weights. If the sum of this output exceeds some threshold value, neuron x will fire and send its output to the next layer according to the weights connect ing it to layer k. The network has to be trained to establish the weights for the connections. In the simplest network, neurons in one layer are connected only to neurons in the next layer. More complex networks feature neurons that are connected within a layer. Probably the most common business uses of neural nets feature feed-forward networks; the neurons in one layer receive inputs from the layer
FIGURE 22-7
Neural nodes.
615
61 6
PART FIVE: EXCITING DI RECTIONS IN SYSTEMS
FIGURE 22·8
A three-layer neural network.
below and send outputs to the layer above. In a feed-forward network, the flow of inputs is in one direction, from the input layer, through intermediate layers, and finally to the output layer. Neural networks have proven to be quite robust in classification problems. For example, suppose that your firm wants to classify new customers into four types: ( 1 ) those who are likely to pay their bills on time, (2) those who may take between two and three months to pay, (3) those taking three to six months, and (4) those who are not likely to pay at all. You might design a neural network to try to clas sify potential customers. The input to the network would be information about the customer, and the output would be a classification into one of four groups corre sponding to the likely payment categories. First you must design the network and then train it. Typically, you would choose a feed-forward network with at least three layers. There is an input layer and an output layer plus one or more hidden layers in between. The layers have connections from the input to the hidden to the output layers. There are also back ward connections, which are only used for training the network. To train the network, you present it with past cases, data on customer attributes, and how these former customers paid their bills. Learning is through back propa gation, because the learning program looks at the output and then works backward to adjust the weights for the connections between neurons. There are various
CHAPTER 22: INTELLIGENT SYSTEMS
Analog Devices manufacturers and distrib utes el ectro n i c devices in the U . S . and abroad; the company has 17 sales offices overseas. Analog Devices sells to many small electronics firms and has a group of e n g i neers to provide customer su pport. There is also an online catalog with standard search capab i l ities; however, many cus tomers cannot locate the device they want in this catalog and end up calling customer support for help. The company funded a project to use case-based reasoning to reduce the number of calls to the support group. The developers focused on a family of components known as operational amplifiers, which offers about 1 30 products. Each amplifier is described by a product sheet with about 40 parameters. The system computes a similarity index by
processing the parameters to develop a rec ommendation for amplifiers that are closely related to each other. In a typical interaction, a customer en ters parameters into a query form. The sys tem then retrieves the 1 0 best matches for these parameters. If the results fail to satisfy the customer, he or she is asked to prioritize the most important parameters. Again the system retrieves the 1 0 best matches. A dissatisfied customer can enter more pa rameters and keep asking the system for its recommendations. Essentially, the system has some knowledge of the domain for the amplifier family, unlike a standard search engine that might j ust look for keywords. This knowledge lets the system provide more useful advice to users of the online catalog.
learning rules that are used to adjust the weights during training. For example, the delta training rule attempts to minimize the sum of squared errors between the ac tual output of the system and the correct output. If, during the training, your net work misclassified a former customer, the delta rule would adjust the weights to try to minimize the error. After training with a large number of cases, the weights should stabilize and the network is ready for use. At this point, you begin to use the network to classify new customers based on the same kind of input informa tion you used to train the network. There are PC shell programs available to help develop neural net applications. This AI approach is used to predict bankruptcies and to help identify thoroughbred horses based on blood samples. A neural network is one way to think about some classification and prediction problems. There are also other ways to classify and predict based on classical statistical procedures such as discriminant analysis, lin ear regression, and exponential smoothing, to name a few. One challenge is to find the most appropriate technique to use for a given problem. Case-Based Reasoning
Case-based reasoning (CBR) captures lessons from past experience and uses them to find solutions to a new problem. CBR is both a problem-solving approach
61 7
618
PART FIVE: EXCITING DIRECTIONS I N SYSTEMS
and a model of how some experts think individuals learn, remember, and think about problems. A case-based model is particularly appropriate when rules cannot express the richness of the knowledge domain. CBR is described as most useful when there is rich experience but little knowledge. A case-based system needs cases, a similarity index, a case retrieval mecha nism, and an explanation module. A case is similar to the cases you study in school: it has a set of features, attributes and relations, and an associated outcome. A case is specific to a given situation, unlike a general rule in a rule-based expert system. The PERSUADER is a case-based system for mediating management and labor disputes. For this CBR program, a case is a past labor dispute similar to the one it now faces. A repository of past cases is crucial. The more cases and the greater the variety of experiences they represent, the better the recommendations from the system. A set of indices is the mechanism through which cases similar to the one under consideration are located. The indexing process stores cases and generates similar ity indices to be used in retrieving cases similar to the one at hand. The task of de veloping robust indices is one of the biggest challenges facing developers of case based systems. Another component, the retrieval mechanism, must retrieve cases with the closest match between attributes of past cases and the current case on which advice is sought. The explanation module allows the system to explain its analysis of the current problem and a proposed solution. It should describe why and how the present problem is similar to past cases. A user presents the system with a problem and the system indexes its attributes, features, and relations based on standards built into the system. The system uses these indices to retrieve a set of similar past cases and their solutions based on the indices created when the cases were originally added to the knowledge base. The system examines the cases retrieved from "memory" to find the best fit with the current problem. It also examines the solution to past cases until it can generate a proposed solution to the problem at hand. If the system's proposed solution is ac cepted, it incorporates the current case into its knowledge base to be used again in the future. Genetic Algorithms
The traditional approach to solving problems in artificial intelligence involves looking at a single candidate for a solution and interactively manipulating it using various heuristics, or rules of thumb. Genetic algorithms work on a popu lation of candidates at the same time. This population of candidate solutions may be as few as ten to several thousands. Figure 22-9 describes these evolu tionary computations. In general the approach involves generating a population of possible problem solutions (the unrated population in the figure) and rating them based on some fitness function. The next step is to apply a selection func tion to the unrated population to select "parents" for the next generation of solu tions. A reproduction function generates copies of the parents. These copies go
CHAPTER 22: INTELLIGENT SYSTEMS
FIGURE
22·9
General procedure for all evolutionary computations. A complete cycle from unrated population to unrated population represents one generation of the search.
through mutation operations to create the next generation of solutions for evalu ation, closing the loop in the figure at the "unralted population" in the upper left hand corner. To start, a genetic algorithm rates how good each solution is for the problem under consideration using a fitness function. This function is similar to a cost function used in other search techniques. The function returns a number denoting the worth of the solution just evaluated. The objective of the genetic algorithm is to minimize (or maximize, depending on the problem) the value returned by the fitness function. Once the fitness function evaluates all candidates, the genetic algorithm selects a subset of the population to form "parents" for a new population. The algorithm chooses parents based on the relative worth of the candidates in the population as determined by the fitness function. Genetic algorithms feature a variety of selec tion methods to designate the parents. As an example, a simple strategy would be to take the best half of the current population to be the parents for the next genera tion. Most of the time, the selection of the better part of the population is aug mented with lesser fitness scores to promote diversity. To create a new generation of possible solutions, the genetic algorithm ap plies operators known as. mutations to copies of the parents it has selected.
619
620
PART FIVE: EXCITING DIRECTIONS IN SYSTEMS
FIGURE 22· 1 0
(a) I nversion, (b) point mutations, and (c) crossover operations used in genetic algorithms.
These mutations alter the content of the parents. As shown in Figure 22· 10 ge netic algorithms represent problem solutions as fixed-length vectors containing features of the solution. Genetic algorithms mimic the manipulation of DNA and gene sequences. The mutations include inversion, point mutation, and crossover as shown in the figure. The inversion operation reverses the order of randomly selected, contiguous portions of the vector. A point mutation alters a single fea ture, replacing it with a randomly chosen value. The crossover operator ran domly selects a sequence of features and swaps them between two parents. This latter mutation is the most popular and most frequently used. The creation of populations stops after a set number of generations or after the fitness function reaches a predetermined value. A rule-based expert system will show the rules that "fired" and allow the user to trace the path used to reach the solution. Like neural networks, genetic algo rithms do not provide the user with an understanding of how they reached a solu tion. Both of these techniques provide good solutions to a variety of problems de spite the drawback that their solution mechanism is not obvious. Intelligent Agents
If you combine AI with networks, the resulting innovation is an intelligent agent. An agent is a piece of software that performs a task for its owner. Some developers call agents "softbots," a play on the mechanical robot. An intelligent agent must exhibit some kind of behavior that observers would consider to be "intelligent." Suppose you could send an agent over the Web armed with a re quest to obtain the four lowest prices it could find for a certain kind of appli ance, say, a VCR, and have it return with the information. Would you consider this to be intelligent behavior? The first applications for intelligent agents have been for consumer tasks like shopping. A pioneer in developing these applica tions created a Web site to provide recommendations on music. A user indicates the types of music she or he likes, and an agent matches the profile with those of others in the database. It recommends music to the user that matches the
CHAPTER 22: INTELLIGENT SYSTEMS
One application of the CBR (case-based reasoning) technique has been used for collabo rative f i l t e r i n g e n g i n e s . For i n stance, CDnow (www.cdnow.com). a lead ing online music store, leverages this CBR e n a b l e d fi lteri n g t ec h n i q u e to d i v i n e a user's p references, be h aviors, or both based on what other previous customers with similar characteristics liked or did not like. Album Advisor (the music recommen dation system at CDnow) asks a customer to enter the names of three artists on the Web screen , and then it returns sugges tions based on a h i storical database of what other people who bought the chosen three artists purchased. By clicking a "play it" button, customers are allowed to listen to the recommended tracks recorded as RealAudio clips. CDnow also sends those customers weekly e-mail n ewsletters of suggested albums providing the latest in formation on prices and availability of the particular titles.
Michael Krupit, vice president of technol ogy and creative services, says, "Customers are getting better judgment from artificial in telligence than they would from the human intelligence of most clerks at a retail store." In fact, this collaborative filtering engine technique developed by Net Perceptions (www. netperceptions.com) is also being used by Amazon.com and Billboard Talent Net. According to John Riedl, chief technol ogy officer at Net Perceptions and a former professor of computer science at the Univer sity of Minnesota, customers' average order volume has grown between 2 to 5 percent due to the installation of the CBR-enabled recommendation system. In a foreseeable future the impact will be even more signifi cant as its existence is now being much pub licized to the users. It seems evident that the CBR technology has helped many Web based businesses and will continue to con vert a lot of casual browsers to buyers in those domains.
profile. We are just beginning to understand the potential that intelligent agents have for serving their owners. CHAPTER SUMMARY 1. Intelligent systems exhibit behavior that would be called intelligent if viewed
by a person. 2. Intelligent systems process symbols as well as numbers. 3. The first widespread application of artificial intelligence to business was through expert systems. 4. An expert system has a knowledge base and inference engine. 5. An expert system (ES) may represent knowledge through the use of rules or frames. 6. An ES is developed through prototyping, and it is important to test it carefully. 7. Expert systems perform well in the domain for which they were designed, but have no knowledge of other domains, while most humans are capable of rea sonably intelligent behavior over a variety of domains.
621
622
PART FIVE: EXCITING D I RECTIONS I N SYSTEMS
8. Knowledge discovery combines database technology and AI techniques to
help a user discover interesting patterns in large databases. 9. Neural networks are an intelligent system loosely based on how the brain
10. 11. 12.
13. 14.
15.
functions. The user trains a neural network with a number of cases so the network can solve future problems with similar characteristics. Case-based reasoning uses past experience as a guide to offering a solution to a current problem. Genetic algorithms are based on evolution. They evaluate a large population of potential solutions to a problem, select parents for the next generation of solutions, and apply mutation operators to produce the next generation of so lutions for evaluation. Intelligent systems may provide the firm with a number of advantages. For ex ample, they can make expertise widely available in the organization. These systems can also perform more mundane tasks, such as the expert sys tem for accepting securities in the brokerage office in the Merrill Lynch exam ple in Chapter 18. The technology discussed in this and the previous chapter extends the power of the computer to the direct support of decision making and management ac tion. The manager does not have to scan a report and interpret data. He or she interacts with a system designed to support decisions.
IMPLICATIONS FOR MANAGEMENT
When expert systems first became popular, some forecasters suggested that they would forever alter the nature of information processing. Initial enthusiasm waned as the difficulties of developing intelligent systems became more apparent. There is certainly a role for this technology as the examples show. However, you should regard the development of an ES as an R&D project. It is certainly more risky than a conventional application. KEY WORDS
Artificial intelligence (AI) Back propagation Backward chaining Case-based reasoning (CBR) Crossover Dendrite Evolutionary computations Expert system Feed-forward network Fitness function Forward chaining
CHAPTER 22: INTELLIGENT SYSTEMS
Frame Genetic algorithm Heuristic Inference engine Inversion Knowledge base Knowledge discovery Mutation Neural network Neuron Semantic network Shell Stock option Synapse User interface Weight RECOMMENDED READING Clifford, J.; H. C. Lucas, Jr.; and R. Srikanth. "Integrating Symbolic and Mathematical Models Through AESOP: A System for Stock Options Pricing," Infonnation Systems Research. 3, no. 4 (December 1992), pp. 359-378. (A paper describing the AESOP sys tem presented in this chapter.) Dhar, V. and R. Stein. Seven Methods for Transfonning Corporate Data into Business In telligence. Englewood Cliffs, NJ: Prentice Hall, 1997. (A book illustrating several meth ods for making organizations more intelligent.) Gill, T. G. "Early Expert Systems: Where Are They Now?" MIS Quarterly. 19, no. 1 (March 1995), pp. 5 1-70. (The author presents a survey of users of expert systems and reports that only about a third of the systems continue to be used; he offers some con clusions about the difficulty of implementing ES.) Grandon, T. "Expert Systems Usage: Task Change and Intrinsic Motivation," MIS Quar terly. 20 no. 3, 1996, pp. 301-329. (An article examining motivating factors for using expert systems.) Gupta, U. "How Case-Based Reasoning Solves New Problems," Inteifaces. (November December 1994), pp. 1 10-1 19. (A good introduction to CBR.) Liebowitz, J. The Handbook ofApplied Expert Systems. Boca Raton, FL: CRC Press, 1997. (This author' s latest book provides expert systems technologies with many applied ex amples in a wide variety of industries.) Trippi, R.; and J. Lee. Artificial Intelligence in Finance & Investing: State-Of-The-Art Technologies for Securities Selection and Portfolio Management. New York: McGraw Hill, 1996. (A clearly illustrated book introducing the artificial intelligence applications in finance.) Vasarhelyi, M.; and D. O 'Leary. Artificial Intelligence in Accounting and Auditing: Knowledge Management and Value Creation. Princeton, NJ: Marcus Wiener Publish ing, 1998. (A recent textbook dealing with real accounting applications built with artifi cial intelligence techniques.)
623
624
PART FIVE: EXCITING DIRECTIONS I N SYSTEMS
DISCUSSION QUESTIONS 1. What
are the reasons for developing an expert system? between an expert system and a conventional system? 3. In what ways does an expert system resemble a decision-support system? 4. What is backward chaining? Forward chaining? 5. Why are production rule systems popular for advisory systems in business? 6. What is the attraction of using an ES shell on a PC for developing a system? 7. What is the difference between knowledge engineering and systems analysis? 8. How could a system like Intemist- l be used? 9. Why is a mistake in authorizing credit card purchases costly for American Express? 10. Why is prototyping a good approach for the development of an ES? 11. What is the purpose of the inference engine in an expert system? 12. How is symbolic processing different from numeric processing? (Hint: Review the ex ample of forward and backward chaining in the chapter.) 13. Why is the user interface an important component of an expert system? 14. What are the differences in managing an expert-systems development project and de signing a transactions processing system? 15. How does one go about identifying the expert to be used in deVeloping an expert system? 16. What techniques can you suggest to help the designer extract and document the expert' s knowledge? 17. What benefits can knowledge discovery systems provide to the organization? 18. What kinds of problems are best suited to the use of a neural network? 19. What steps are involved in creating a neural net? 20. Explain the way a genetic algorithm functions. What is the underlying model for this approach to intelligent systems? 21. How do expert systems contribute to the port operation in Singapore? How does the technology help Singapore implement its economic strategy? 2. What are the differences
CHAPTER 22 PROJECT
Expert Systems The admissions department in your school has asked for your help in developing an expert system for rating candidates. The system should take three input condi tions into account: • •
•
Graduate Management Aptitude Test (GMAT) score Grade point average (GPA) Experience (good, average, poor)
CHAPTER 22: INTELLIGENT SYSTEMS
The user will evaluate experience directly from the application. The expert system should come up with a value for overall academic performance as good, average, or poor by combining the results of the GMAT and GPA. The rules are as follows:
GMAT
GPA
> 575 > 525 < 525
> <
=
525 <
=
GMAT< 575
= =
Performance
33 2.8 GPA < 3.3 .
< 2.8 > 2.8
Good Average Poor Poor Average
The rules for acceptance are as follows:
Academics
Experience
Action
Good Good Good Average Any other combination
Good Average Poor Good
Accept Accept Waiting list Waiting list Reject
Use an expert system shell on a PC to develop this expert system and run several examples to demonstrate how it works.
625
Management of information technology policy and strategy
626
PART SIX
I
F E E
We conclude the book with an examination of
I
special management con
cerns about information technology. What are the special problems of man aging IT? What do future trends in management and technology mean for the organization? How will new technologies affect the firm? To enjoy all of the benefits from IT we have discussed to this point, you have to be able to manage the technology. The last chapter expands the boundaries of information systems beyond the organization to include society at large. What social issues should the manager consider when making decisions about information technology? What does responsible computing require?
627
CHAPTER 23
I
Outline Management Control
Control Theory Control in the Organization Failure of Control Information and Control Control of Systems Development Control of Operations Control and Electronic Commerce Auditing Information Systems Management Issues Security Issues: Viruses, Worms, and Other Creatures
Focus on Change
Information technology can provide novel ways to control the organization, making possible new organizational structures and alliances with external firms. Virtual firms, or firms with extensive outsourcing, face problems of con trol and communications. How can the manager be sure that a virtual partner or firm in an alliance is meeting their obligations? How do you control an interna tional organization where employees can commit the firm without any review?
629
630
PART SIX: ISSUES FOR SENIOR MANAGEMENT
Managerial control and coordination are closely related. New organizational forms must address the issue of how management can control the organization. MANAGEMENT CONTROL
One of the fundamental roles of management in an organization is control. What is control? How do managers control the organization? This chapter seeks to answer these questions, particularly with respect to information systems. Control Theory
Process control offers a useful model for thinking about control in general. Con sider Figure 23- 1 , which shows a typical control system. In this system, a sensor determines actual conditions, and a comparison device compares the standard with what actually exists. If the difference between reality and the standard is too great, the comparison device sends a signal to take action. The action taken in turn affects the sensor and standard, and the cycle continues until the compar ison device finds agreement between sensor and standard, and stops signaling for action. A real example of this model may be found in an automobile's cruise control system. We set the adjustable standard-the speed we desire-using the cruise control button. A sensor determines the car's speed, and a control unit compares the desired setting and the current speed. If the difference between the two is too great, the cruise control system increases or decreases the throttle appropriately.
FIGURE 23·1 A control system.
CHAPTER 23: MANAGEMENT CONTROL OF I N FORMATION TECHNOLOGY
This example shows how a basic control system functions. In an organization, we can apply the same concepts. Managers have a notion of a standard, and they must become aware of deviations from the standard. Given that some indicator de viates from the standard, management must take action to bring the organization back into control. Control in the Organization
Figure 23-2 shows some of the tools available to managers at different levels for controlling the organization. Top management can create control through the structure of the organization. For example, management can decide to decentral ize and to have local managers responsible for comparing their performance with the goals the managers set for the year. As an alternative, top management can opt for a high degree of centralization so it can set policy and review all decisions. Our discussions of the T-Form organization suggest that in the future, manage ment will have a more difficult time using traditional methods such as structure for control. Hierarchical structures are in retreat, and managers will have to trust sub ordinates and come up with new ways to exercise their responsibility for control. An example shows how Mrs. Fields Cookies uses technology and IT to develop a unique control system.
FIGURE 23·2
Tools of management control.
63 1
632
PART SIX: ISSUES FOR SENIOR MANAGEMENT
'I In 1 989 the Bank of England started a work ing group to design a new paperless system for processing settlements on the London Stock Exchange. The Exchange had be come electronic in 1 986. The cost of a cen tralized clearing system was estimated at 60 million pounds, so the committee came up with a design based on distributed data bases at hundreds of sites, with many differ ent kinds of hardware and software linked to the Stock Exchange through a network. Work started on the system in 1 990 with an estimated budget of 50 million pounds. A software package from a New York firm, the market leader, was to be the base of the system; the design would use a structured methodology. The date for completing the system grad ually slipped and its costs rose, first to 75 mil-
lion pounds. By the fall of 1 992 it was clear that the basic architecture of the system had not been completed. A full review in January of 1 993 determined that its underlying prob lems were so serious that it would take an other three years to complete and that its cost would double. In March of 1 993, the Stock Exchange announced that work on Taurus was to be abandoned. By this time costs had reached 400 million pounds! The failure of Taurus was significant enough that the head of the London Stock Exchange re signed because of its failure. Management has to control the organi zation, but it also needs to control individual projects, especially when they are critical to t h e organ izat i o n . Taurus cost a h u g e amount of money and cost a senior execu tive his job.
Top management also exerts control through a reward structure. Several broker age firms suffered control breakdowns, partially, we suspect, because of a reward structure encouraging heavy risk taking in bond trading. The firms paid bond traders very large bonuses based on performance because bond trading is highly competitive among firms. More than one firm found it lost well over $100 million in a few weeks when the market turned. There was a highly motivating reward system and almost no managerial control over the traders. Two banks recently found losses of over one billion dollars in unauthorized trading, forcing one bank into a merger. One form of managerial control that is used frequently and probably could have helped ameliorate the bond trader problem is the management committee. For many years banks have employed loan review committees. The lending officer has a certain limit he or she can approve on a loan. Any loan larger than the limit must be discussed and ultimately approved by the committee. The committee serves as a review and control role in the firm. The most frequent middle-management control device is the budget. Many managers in the organization receive periodic budget reports that inform them of actual versus targeted performance. Budgets are extremely important tools for controlling expenditures.
CHAPTER 23: MANAGEMENT CONTROL OF INFORMATION TECHNOLOGY
Middle managers are also expected to exert direct supervision over their subor dinates, though more remote work makes this difficult. When in doubt, they can refer problems up through a managerial hierarchy. The entire structure of manage ment serves to control the organization and keep it on course. Middle managers can also establish review committees to foster greater control. At the lowest levels of management, we find procedures describing how opera tions should be done. Procedures were particularly evident in paperwork transac tions processing departments. If one visited an accounts payable operation, it was possible to see clerks who carefully looked up each bill the firm received to find the purchase order that authorized the purchase. The clerk saw that the goods or services purchased actually arrived and delivery was satisfactory. Then the clerk authorized the payable and put all the documents relating to the payment into a voucher, which was filed for a number of years. This kind of manual accounts payable operation is rapidly vanishing, which creates new control problems for the organization. Consider Chrysler's Pay as Built program where it calculates what it owes suppliers based on each day's pro duction and sends an electronic payment. How do Chrysler and its suppliers know that the calculations and payment are correct? At some point in time, the number of components shipped to Chrysler should match the payments, but verifying these transactions could be a formidable task. Regular, routine audits help to establish control by showing that control is im portant and by sending the message that there is a form of quality control over all the firm's procedures, or at least those affecting financial statements. Lower-level managers also have direct supervision responsibilities. They too can make use of the managerial hierarchy to obtain approvals or additional guidance. Failure of Control
What happens when management control fails? Very often, a firm fails as a result of a control breakdown. In the computer industry, there are notable examples of firms with very few controls. In one case, while the single product the firm sold was in demand, it was possible for high sales to mask the lack of budgets and the absence of controls over expenditures. However, when demand for the product dropped, the failure to have budgets or control expenditures pushed the firm into bankruptcy. Information and Control
One contribution of information systems is to strengthen control systems. A man ager needs information about the deviation of actual from standard, or targeted performance. Computerized budget systems help managers identify exceptions and take action. Executive information systems, discussed in Chapter 2 1 , monitor critical indicators for management. Senior management may be able to take imme diate action if sales are falling below projections. Managers may alter production schedules, emphasize different products, and/or begin to reduce expenditures.
633
634
PART SIX: ISSUES FOR SENIOR MANAGEMENT
Mrs. Fields Cookies is an oft-cited example of a firm that has used information technol ogy as part of its organization structure. Mrs. Fields Cookies is a chain of small retail out lets, typically found in shopping malls, which sell several varieties of cookies and a few other selected food items. I n 1 988 there were approximately 500 retail stores world wide. Stores follow a formula of consistent, uniform quality and price regardless of loca tion. However, Mrs. Fields Cookies has a unique structure. It has two parallel organi zations, one of which has a traditional hierar chy and another which has a flat organiza tion structure. The traditional hierarchy is formed by 500 store managers, 1 05 district sales man agers, 1 7 regional directors, four senior re gional directors, a VP of operations, and fi nally Debbie Fields. The span of control of this hierarchy is about 1 :5. The second organization is a formal re porting relationship for control purposes; here 500 store managers report to six store controllers, who report to the vice president of operations. The span of control between store managers and control lers is 35 to 75: 1 , which represents a very flat organi zation structure. The "human" side of man agement at Mrs. Fields is through a tradi tional hierarchy. The "numbers" side is a flat organization made possible through in formation technology. U ntil recently, every shop was wholly owned by the company rather than fran chised, and the company was u nder the
strong centralized control of Mrs. Fields and her h usband. The unique organization of M rs. Fields Cookies allowed the owners maximum flexibility in adapting its offerings to the changing tastes of customers in a "fad" business. IT is an integral part of the structure of M rs. Fields Cookies. Each store is con nected on-line to a central database, and there is extensive automation of production quotas, sales volumes, etc., based on recent daily sales records for each store. In fact, each store is given hourly sales projections and reports hourly sales results. All ordering of supplies (e.g., chocolate chips) is done automatically from the central database with direct delivery to the store. Each store's product mix, sales quotas, and special promotions are customized by an expert system that adapts to hourly sales. The company also uses IT for coordination through voice mail and electronic mail so each store manager has direct personal in teraction with Mrs. Fields herself. Company wide announcements are frequently broad cast to each store by voice mail, significantly personalizing the announcement compared to memos and reports. (Debbie Fields was a cheerleader in high school, and voice mail seems a natural way to rally the troops.) Each manager may send Mrs. Fields elec tronic messages for particular problems and expect a personal response within 48 hours. There have been management problems at Mrs. Fields. The firm expanded rapidly, possibly encouraged by the success of its
Although information systems can help to improve managerial control, they create a tremendous control problem themselves. Information systems are very complex. For example, it is likely no one person understands everything about a large system like SABRE. So although managers do not necessarily understand the technology, they are often responsible for seeing that information systems are under control.
CHAPTER 23: MANAGEMENT CONTROL OF I N FORMATION TECHNOLOGY
technology, and ran into difficulty integrating its acquisition, La Petite Boulangerie, with its traditional cookie stores. While Mrs. Fields can change its mix of cookies easily, the original cookie operation is basically a one product business. The firm is also reported to have had difficulties with its product and market mix when it entered international markets. U nfortunately, M rs. Fields' h i g h debt created problems in 1 991 . Trading of its stock was suspended pending restructuring of its $70 million debt. Undeterred by debt, in 1 992, Mrs. Fields Cookies and Pasterele ria el Molino announced a leasing agree ment to open 50 stores in Mexico over five years. In May of 1 992, Mrs. Fields launched F i e l d s I c e C r e a m . The c o m p a n y also started M rs . Fields Mini Cookie Store, a cart equipped with a cookie baking oven designed to be set up in grocery stores. The March 1 , 1 993, issue of Business Week reported that Mrs. Fields "is throwing in her apron." On February 1 7, Debbie Fields, who started her cookie-making empire in Palo Alto, CA, back in 1 977, stepped down as president and chief executive officer. Fields, who retains her position as chair woman, turned over nearly 80 percent of the company to four lenders led by Pru dential Insurance Co. Mrs. Fields' problems probably did not stem from its control system. Rather, it ap pears that M rs . Fields as an organization
became overconfident regarding its abilities to manage businesses that were not a part of its core. A bakery chain like La Petite B o u l a n g e r i e is d iffe rent f ro m a cookie store. Did the technology lead manage ment into a false sense of confidence and invulnerability? The example shows that you can use technology to personalize and control the business. All Mrs. Fields stores look alike and suffer from high labor turnover. Mrs. Fields was very concerned about control and about quality. The technology helped her manage these two aspects of the business. First, store controllers are a control mechanism. Second, the control of quality is an important issue for Mrs. Fields. The combination of in-store com puters and uniform recipes, cooking instruc tions, and ingredients help provide quality control. Voice mail and e-mail helped moti vate and, to some extent, control employees. At Mrs. Fields, control comes from a combi nation of structure and technology; there is no single IT variable for control. A group of de sign variables and the structure of the organi zation together provide control. The techno logy allowed D e b b i e and Randy Fields to create different types of or ganization structures within the same firm. They could also "micromanage" what was happening at individual stores through the contro l l e rs at headq uarters. The u n a n swered question i s whether t h e technology helped lead top management away from their core business into ventures they did not understand well.
CONTROL OF SYSTEMS DEVELOPMENT
An important area in which organizations face loss of control is in the develop ment of new information systems, which, as discussed in Part Four, is similar to conducting research. It is hard to predict how long it will take and how much it will cost to develop something new. Since most systems have components that are new, there is a great deal of uncertainty in their development.
635
636
PART SIX: ISSUES FOR SENIOR MANAGEMENT
We have seen that elaborate computer net works help you make a plane reservation and help the airlines manage all aspects of their business. What happens when you get on the plane and the air traffic control (ATC) system takes over? What is supposed to happen is that the airport tower assumes control for takeoff and hands the plane off to a Terminal Radar Approach Control (TRACON) facility, which d i rects planes at low altitude and around airports. TRACON passes control of the plane to a Control Center when it reaches a high altitude. For a variety of reasons from govern ment procurement policies to poor project management, plans to upgrade the ATC system have left us with an antique system. The good news is that it seems to work most of the time. However, at least 1 1 times in 1 994-1 995, air traffic control centers have had p roblems or broken down com pletely. Random outages continue to occur. Some of t h e comp uters that h e l p track planes are 25 years old. U n fo rtunately, much of the original software was written in assembly language or a special language called JOVIAL. This code must be updated before the computers can be replaced. When the main computers fail, a backup system from the 1 980s takes over to provide radar data to the controllers. However, they do not have the full information provided by
the first-line system. For example, in backup mode, the system can no longer project a plane's route, warn when planes are too close or might collide, or provide a minimum safe altitude warning. When the backup sys tem fails, the amount of information provided to the controller is even less. Right now, the system causes frustration for controllers and pilots, and results in ex pensive delays. The FAA claims that safety is never compromised, but the combination of failure-prone equipment, reductions in the maintenance staff, shrinking ATC budgets, and an increasing number of flights seems like a disaster waiting to happen. A mUlti billion dollar effort began years ago to up grade the system, but progress was so slow that the Clinton administration stopped the program and asked for a redesign. Technol ogy had changed so much during the project that its origi nal design no l o n g e r made sense. For example, the airlines have in stalled Global Position Systems (GPS) in most of their aircraft providing location data within 1 00 meters. Because of this kind of in formation plus onboard collision avoidance alarms that are available to pilots, it was necessary to rethink the entire system. It is interesting to compare the airlines' huge investment in technology with an air traffic control system running on computers that may be older than the reader!
It is quite possible that the majority of information systems developed to date have suffered from being over budget, from going beyond their targeted comple tion times, and/or from not meeting their specifications. How can general manage ment control systems development? Some of the development techniques discussed earlier, especially the alterna tives to traditional design examined in Chapter 17, help provide control. The use of a package, if carefully selected, should reduce uncertainty because we can view the package and we know code exists that has been executed before installation. In addition, prototyping should help in forecasting the kind of effort required to de velop a system, and the use of fourth-generation languages can reduce program ming time, given that the language meets performance requirements.
CHAPTER 23: MANAGEMENT CONTROL OF I N FORMATION TECHNOLOGY
Managers can also help control development projects by attending review ses sions and providing input. Projects slip for a number of reasons, including lack of user input, too few resources, too few individuals working on the project, and lack of management support. Managers who stay in close contact with the progress of a project are in a position to allocate new resources or to influence development priorities. It is also important to be sure that the information services staff is concerned about project management. There are many programmers and analysts who view their profession as a craftlike trade. They feel that time spent managing a project is wasted and could be better spent in doing analysis or programming. Manage ment must demonstrate that it wants projects to be controlled. One approach is to insist on the use of proj ect management tools like the critical path method (CPM). Another is to consider the use of tools like designers' workbenches and computer-aided software engineering (CASE) tools to help manage and control projects. CONTROL OF OPERATIONS
In addition to controlling systems development, management must be concerned about controls over the operations of systems. • At least twice before the collapse of the Soviet Union, air defense alarms sig naled the launching of Soviet missiles aimed at the United States from both land bases and submarines. The first time, officers in charge of the system suspected something was wrong with the data. In flight, the missiles supposedly appeared on only one sensor and not on others. However, the defense command re,mained on alert status for more than five minutes, and fighter planes were sent aloft while the data were checked. The monitors were wrong. Through a human error, a connection wa� made between an off-line computer running a simulation exercise of the firing lilf land and submarine-based missiles and the on-line computer monitoring air defense at the time. Because the test did not simulate data from all sensors, the officers in command were suspicious. What would have happened if the simulation were i complete? (No details were released on the second incident.) • Near the end of 1985, a computer problem at the Bank of New York nearly halted the treasury bond market for 28 hours. The computer program had a transaction number counter that could reach as high as 32,000 items. On the day of the failure, the number of transactions exceeded 32,000 for the first time. The computer then stored each record on top of the last one, losing data and corrupt ing the database. This control failure rippled through the financial system. Because the Bank of New York did not know its position, it could not demand payment from cus tomers to settle trades. The bank had to borrow the cost of carrying the securi ties from the Federal Reserve and asked for $20 billion overnight. The interest on this loan was $4 million per day !
�
.
fectively. Is the network operating system reliable and secure? Can outsiders gain unauthorized access to company systems through the Internet?
637
638
PART SIX: ISSUES FOR SENIOR MANAGEMENT
Since other banks were expecting to pay for the bonds, they had an extra $20 billion on hand overnight, causing the federal funds' rate to plummet from 8% percent to 5� percent. When there are rumors of problems in the bond mar ket, traders buy platinum. The price for January platinum delivery rose $ 12.40 per ounce on a volume of nearly 1 2,000 contracts, a 29-year record at the New York Mercantile Exchange. • Programmers in a financial institution computed interest calculations on savings accounts as if there were 3 1 days in every month. In the five months it took to discover the error, the institution paid more than $ 100,000 in excess interest. • Programmers and analysts in a large mail-order house designed a "perfect" sys tem. It would operate only if all errors were eliminated. After installation, audi tors discovered that errors were occurring at the rate of almost 50 percent. The system collapsed and had to be abandoned after an investment of approximately a quarter of a million dollars. • A student at a major university introduced a virus, or, more correctly, a worm, into one of the major networks connecting various computers. He is thought to have exploited a little-known opening in systems software to send a program to other computers. The program replicated itself and slowed the computers to a near standstill. These examples all represent failure of control in the organization. For a control system to work, the organization must have a model of its desired states. Often, this model is in the form of routine procedures or generally accepted accounting practices. For problems like controlling a sales representative, standards are less clear, as is our ability to influence behavior. All levels of control in the organization are the responsibility of management. The Foreign Corrupt Practices Act makes operational control a legal as well as a normal management task. This act requires that publicly held companies devise and maintain a system of internal accounting controls sufficient to provide reason able assurances of the following: • Transactions are executed according to management authorization. • Transactions are recorded as necessary to permit the preparation of financial statements according to generally accepted accounting principles. • Records of assets are compared with existing assets at reasonable intervals, and action is taken when there are differences.
Information technology gives organizations the ability to process large numbers of transactions in an efficient manner. These same systems create significant control problems and challenges, however. With thousands of transactions processed in a short time, an error can spread through an immense number of transactions in minutes. Control failures can become costly, and firms have been forced out of business because of their inability to control information process ing activities. There are many opportunities for errors to occur in computer-based process ing. Figure 23-3 is a diagram of the most difficult case: a client-server system
CHAPTER 23: MANAGEMENT CONTROL OF I N FORMATION TECHNOLOGY
1. 2.
Client Programs/ Operating systems
1.
Server
2. Programs/ Operating systems
FIGURE
23·3
Components of a client-server system.
with widespread connections outside the organization. The figure highlights eight areas where the system is vulnerable. 1. The operating systems for the client and server control the operations of the computers and allocate computer resources. Operating systems can and have been penetrated. They also have errors in coding, as does any other program. Someone who is unauthorized could gain access to a network through the op erating system of the server, or possibly through a client machine. An intruder would masquerade as a legitimate client in order to gain access to the server's operating system. 2. Applications programs contain the logic of business processes in the organiza tion. These programs may have errors or may be incomplete in their editing and error checking for input and processing. The programs may execute entirely on the client computer or on some combination of the client and the server. The server might replicate an error across all the clients using a certain program. 3. Databases exist on the server, and there may be local user data on the clients. Data are often proprietary or confidential within the organization. Are the data safe from accidents? Are crucial data files on the server backed up? 4. The entire network must operate reliably if transactions are to be processed ef fectively. Is the network operating system reliable and secure? Can outsiders gain unauthorized access to company systems through the Internet?
639
640
PART SIX: ISSUES FOR SENIOR MANAGEMENT
5. Many applications have a number of associated manual procedures for the submission of input and the processing of output after it has been produced by the system. These procedures must be developed with adequate controls to en sure the accuracy and integrity of processing. 6. At a higher level than the individual user, the organization itself must be struc tured with control in mind. Management must take its responsibilities seri ously and emphasize control. 7. Networks provide connectivity. Wide area communications links are subject to failure, penetration, and sabotage. This is especially true with the Internet, which opens the firm to access by millions of people. S. Many systems are also available to external users from other organizations. These individuals may make mistakes or intentionally try to misuse a sys tem. Controls must protect the system from these users and the users from themselves. CONTROL AND ELECTRONIC COMMERCE
To what extent is concern over security on the Internet inhibiting electronic com merce? Some experts feel that Web security is a major issue, while others dismiss security as unimportant. The major issue concerns the transmission of credit card information to a merchant when you order merchandise over the Web. What are the chances of your credit card number being intercepted and misused? What are the chances that someone will figure out how to break into a computer file con taining thousands or millions of credit card numbers and misuse them? There are several responses to these questions. First, some credit card compa nies have said that they will not hold a customer liable for unauthorized charges on a credit card number used in electronic commerce. Their objective is to encourage electronic commerce (and the use of their credit cards). Next, the major Web browsers support encrypted transmission of sensitive data. A server must run corresponding software so that the browser can communicate with it using encrypted data. (Encrypted data are coded in some way that is diffi cult for someone intercepting the message to decode without knowing the key that was used for encoding.) Credit card companies have developed a standard for secure transmission called SET (secure electronic transmission), which offers stronger protection than the en cryption currently found in browsers. There are also various firms that offer secure payment schemes including First Virtual and DigiCash. Other vendors, such as Open Market, provide servers designed especially for electronic commerce. This company has a payment scheme for the Web that makes it economical to charge very small prices for products such as the permission to use a copy of an article. It appears that there are sufficient options to provide confidence in electronic commerce. This situation is in contrast with paper-based transactions where many people are relatively careless with the second copies of their credit card charges, eventually discarding them without tearing them in pieces. It would be far easier to find these discarded copies than to obtain your credit card number as it travels
CHAPTER 23: MANAGEMENT CONTROL OF INFORMATION TECHNOLOGY
over the Web, particularly if it is encrypted in any way. The possibility of someone breaking into a server containing lists of credit cards is probably more serious, and vendors must be careful to protect such information. One company's strategy is to make the credit card information available only to internal computers and not to provide a connection to the Web. AUDITING INFORMATION SYSTEMS
Accounting firms developed procedures for conducting an audit of information systems because so many of their typical clients' transactions are processed by computer. The auditors are most concerned about systems that affect financial statements, the balance sheet, and income statements. Auditors also render an opinion about the viability of the firm. If "mission critical" information systems are not well controlled, the future of the firm is in doubt. The auditor examines a system as a whole, focusing on controls and their effec tiveness. Typically the auditor runs programs to examine databases and transac tions. These programs verify the logic used in processing. Many large organiza tions have internal auditors who continually examine information systems. Based on the above discussion of organizational vulnerability, it can be seen that auditing a technologically complex system is not a trivial task. Many managers are con cerned about the threats posed by a system that has a major breakdown but contin ues processing and producing erroneous results.
641
642
PART SIX: ISSUES FOR SENIOR MANAGEMENT
MANAGEMENT ISSUES
Many of you will eventually be responsible for systems in your functional areas of business. What are the issues you will confront in this role? Backup. It is extremely important to have backup for systems, including off-site data storage. When terrorists bombed the World Trade Center in 1992, firms with backup data quickly set up systems in other parts of the East Coast and were back in business. Firms without backup had a much more difficult time re covering from this disaster. • Security. Personal computers have created a host of security problems because they are so accessible. Users routinely leave diskettes containing important data lying around, and few users physically lock their computers or use start-up password protection programs. As a manager, you will have to decide how much security is necessary to safeguard the data and systems for which you are responsible. • Keeping to the budget. The appetite users have for technology seems to be insa tiable. Computer sales consistently exceed manufacturers' projections. Yet, the organization cannot afford to buy all the technology users want, at least not in any one year. How will you exert budgetary control and set priorities for acquir ing hardware and software, and developing new systems? • Project management. As mentioned earlier, IT projects frequently lose control. If you have the ultimate responsibility for a development project, you will need to be sure the project is under control. Consider using a project management system to track and monitor progress so there will not be unpleasant surprises in place of a finished system. • Control over data. The accuracy of data used in making decisions is always an important management consideration. As we develop more distributed data bases, accuracy and consistency among different copies of the same data will become a critical control issue. •
SECURITY ISSUES: VIRUSES, WORMS, AND OTHER CREATURES
The proliferation of personal computers and the development of communications networks gave rise to a category of programs that can only be called malicious (see Figure 23-4 for a classification of these programs). It is difficult to develop controls to thwart these programs. On March 6, 1 99 2 , the five hundred and seventeenth annivers ary of Michelangelo's birth, a virus bearing his name damaged software on PCs. The virus randomly overwrote the computers' hard disks. It was estimated that some 65,000 computers were infected with the virus. It is not clear how many viruses there are, but a test center in Germany has identified more than 300 types that at tack PCs. As shown in Figure 23-4, not all of these malicious programs are viruses. A Trojan horse is hidden in a useful piece of code. Once this bit of hidden code is inside a user's computer, it becomes active in some way and executes malicious
CHAPTER 23: MANAGEMENT CONTROL OF I N FORMATION TECHNOLOGY
Taxonomy of bad code.
acts or subverts the system. One Trojan horse application subverts security in a computer so an unauthorized user can gain access to it. A virus is usually a small program, say, 2 or 3 Kbytes of code. This program attaches itself to other programs and executes as the first few instructions of the host program. During replication the virus makes copies of itself, but does not harm the system. In its active phase, it changes character and generally damages the computer in some way. Most viruses leave a stl1ing of characters to show that a program is infected. Usually the virus replicates by randomly selecting an executable file. It looks to see if the character string is present. If it is, the file is already infected. If not, the virus infects this file by inserting itself into the program contained in the exe cutable file. The virus tries to infect as many program files as possible, since it can cause damage only when an infected program is run. Usually the virus has a trig gering condition, like the date or the number of times the program has been run. If it is not triggered, the virus remains in the program. When triggered, of course, it does its damage to the system. A number of programs are available to detect viruses and to disinfect systems. In 1995, a new type of -virus appeared, one attached as a macro (piece of exe cutable code) to documents in Microsoft Word. Prior viruses were always found in executable code. This new Concept virus exists in documents as well as code. In addition, most present security systems will not be able to detect this virus since it travels on documents and through e-mail.
643
644
PART SIX: ISSUES FOR SENIOR MANAGEMENT
Financial i nstitutions and their customers have to be concerned with the control of risks. I ndividuals trading financial i nstru ments can create significant exposure for their employers. The following is a list of traders and some problems they created: The combined total of all these "prob lems" is over $3.5 billion in losses for the companies involved! Barings Bank had to merge with a Dutch company, which dis missed the senior management of the bank. General Electric sold Kidder Peabody, par tially because of the trading losses above, and the head of Daiwa Bank resigned after its loss became public.
In addition a number of client companies are suing banks for losses they incurred trading derivatives. A derivative is a complex financial instrument whose value is linked to, or derived from, an underlying asset. This asset might be a stock or bond, a foreign currency, or a commodity, to name a few. Banks and brokerage firms are working to install systems to value complex derivatives, both to help them determine the prices of these instruments and to help control risk. Management wants to know the extent to which the firm is vulnerable if certain events happen, for example, an increase in the prime rate or the devaluation of a foreign currency.
Name
Loss
Employer
Explanation
Bing Sung
$1 62 million (problem in 1 996, reported in 1 998) $2.6 million
RhumbLine (Boston I nvestment Advisor) (1 998)
Charged with unauthorized options trading for the pension funds of AT&T and the state of Massachusetts.
Sumitomo Corp. (1 998)
Off-the-book copper trading and inventing fictitious deals to hide losses; pleaded guilty with prosecutors seeking 1 0-year sentence. For 1 1 years hid bond trading losses trying to make up an original $200,000 loss.
Yasuo Hamanaka
Toshihide Iguchi
$1 . 1 billion
Daiwa Bank (1 995)
IBM has proposed a product called Immune System that uses several virus detec tion tools, including a neural network program, which is installed on a network that an organization wants to monitor. When the program detects a suspicious file, it sends a sample to IBM's T. J. Watson Research Center. There, dedicated computers examine the virus and devise a way to destroy it. The Watson computers inject the virus into a test program and then analyze the results. Then the software matches the virus against profiles of known viruses and finds a suitable antidote. Finally, the soft ware sends the virus's profile and a cure back to the original network. A program with a logic bomb "explodes" when some event triggers it. This ex plosion usually destroys the host computer's files. The logic bomb gets into the computer through a Trojan horse or by a virus. Logic bombs are the favorite tool
CHAPTER 23: MANAGEMENT CONTROL OF I N FORMATION TECHNOLOGY
Name
Loss
Employer
Explanation
Nicholas Leeson
$1 .4 billion
Barings P.L.C. (1 995)
Joseph Jett
$350 million
Kidder, Peabody (1 994)
Victor Gomez
$70 million
Chemical Bank (1 994)
Howard Rubin
$377 million
Merrill Lynch (1 987)
Paul Mozer
$290 million
Salomon Brothers (1 991 )
Had control of trading records as well as doing trades; used futures contracts to bet on a rise in Japanese stocks. Barings P.L.C. was forced to merge; Leeson was sentenced to 6.5 years in Singapore. Fooled the accounting system into crediting him with $350 million in profits from fictitious trades, while real trading lost $1 00 million-he denies wrongdoing. Trader over-reached authority in trading Mexican pesos; loss occurred after devaluation of the peso. Ignored instructions and took a risky position of $500 million in mortgage-backed securities. Ignored new rules limiting the amount of securities a single dealer could buy at Treasury auctions by submitting false orders in the names of clients; served four months in jail, and chairman of firm resigned.
of disgruntled employees who want to get back at their employers. Logic bombs can also be used for ransom. The person planting the bomb will reveal its location if the organization meets his or her demands. A worm travels through a network from one computer to another. If the com puter containing a worm is on a network, the worm searches for other computers that are connected. Finding a victim, the worm establishes a communications link and downloads itself to the new computer. Although the worm may do no overt damage, it can quickly overload a network. The only known remedy is to shut down the network, expunge the worms, and restart the network. Some people consider bacteria to be a virus, but bacteria do not require a host program to infect a system. A bacterium program replicates itself. It acquires as
645
646
PART SIX: ISSUES FOR SENIOR MANAGEMENT
One day a trader at a company in Buenos Ai res was startled by i nformation on his computer screen showing that company funds were being transferred from Argentina through Citicorp (now Citigroup) computers to an account in San Francisco. The trader knew the transfers were unauthorized. He was witnessing an international plot de signed to loot Citicorp's customers around the world. Citicorp had known somet h i n g was wrong and had called in the FBI. The trader in Argentina notified the bank, and this lead gave the i nvestigators t h e break they needed to track down the suspects. With the help of Russian police, the trail led to a com puter operator in St. Petersburg, Russia. Citicorp was extremely concerned; it transfers $500 billion a day. Fast action by governments and banks limited the scheme
to accessing $ 1 2 million in customer ac counts and to actual losses of only $400,000. The investigation led to arrests in the Nether lands, Tel Aviv, San Francisco, New York, and Britain in addition to Russia. Citicorp maintains this is the first time its systems have been breached; it has up graded security even further after the sus pects broke into the system 40 times over five months. The Russian suspect managed to break i nto Citicorp's computers mas querading as a customer and then trans ferred money to accounts opened by confed erates who began to withdraw the funds. Citicorp does not know or will not reveal how the suspect managed to gain access. This example, though rare, illustrates the problem of securing systems that process high volumes of payments or perform other critical tasks.
much computer time as possible and in doing so, slows down the host system. The bacterium program may also try to fill up disk space. The Christmas bacteria got into a university network called Bitnet a few years ago. It displayed a Christ mas tree on the infected machine and used the mail distribution system to send a copy of itself to every user currently connected to the network. The bacterium program grew geometrically and quickly slowed the network to a crawl. Again, the solution was to shut down the network and find and purge each copy of the program. Our defenses against malicious programs are weak, particularly in a university environment where we want systems to be easy to use and available to all members of the community. Passwords on systems are the major defense against unautho rized access. There are also programs that can be run on Unix systems to check for places where the system is vulnerable to penetration. As mentioned above, there are virus-detection programs that can be run periodically to check for system intruders. On a stand-alone computer, you have a better chance of avoiding infection. If you are very careful about the source of programs or data you add to your system and run a virus checking program (known as practicing "safe computing"), you can probably avoid contracting a virus. On a network, we are all more vulnerable. The best insurance is to maintain a backup copy of crucial programs and data that are not accessible during normal computer operations.
CHAPTER 23: MANAGEMENT CONTROL OF I N FORMATION TECHNOLOGY
CHAPTER SUMMARY
1. At the highest level, management control over technology deals with plan ning, organizing, and monitoring information processing. 2. At this highest level, management establishes plans and policies, assesses the technology, and looks for ways to apply information processing creatively. 3. Coordination across the corporation is one major control problem for senior management. 4. Middle-level managers in various divisions and locations share many of the same problems as top management. These local managers need to devise orga nizational structures and management policy for information processing in the areas for which they are responsible. 5. Both groups of managers also must relate to information processing man agers. In some corporations, there will be a chief information officer (CIO) to provide coordination and help local management obtain more from its invest ment in computing. 6. All levels of management are responsible for operational controls, although usually the details will be left to middle and lower management in the firm. 7. Information processing systems process vital transactions for the firm. They must have adequate built-in controls. There are many places where things can go wrong in processing. 8. The information services department must have control over the ongoing op eration of systems. 9. Management issues for controlling IT include backup, security, keeping within the budget, and project management. 10. As an individual and as a manager, you need to be concerned about mali cious programs that can damage computers, networks, and, ultimately, the organization. IMPLICATIONS FOR MANAGEMENT
Control is not a very exciting subject, yet it is important for managers to see that the organization is well controlled. You have a trade-off here between excessive control and the risk that some disaster will befall the firm. You can use technology to help control the company as Mrs. Fields did, but at some point you have to trust your em ployees. As your company becomes more dependent on technology, and more net worked, the firm can be exposed to various kinds of electronic threats. In addition to managerial control, you also have to worry about control of the technology. KEY WORDS
Backup Bacteria Logic bomb Security
647
648
PART SIX: ISSUES FOR SENIOR MANAGEMENT
Trojan horse Virus Web security Worm RECOMMENDED READING IEEE Transactions, August 1992. (A special issue devoted to the problems of data security.) Kambil, A.; and J. Turner. "Outsourcing of Information Systems as a Strategy for Organi zational Alignment and Transformation," Unpublished paper. New York: Stem School, NYU, 1994. Lederer, A.; and J. Prasad. "Nine Management Guidelines for Better Cost Estimating," Communications of the ACM. 35, no. 2 (February 1992), pp. 50-59. (This paper dis cusses cost estimating, an important part of controlling projects.) Meine1, C., "How Hackers Break In . . . and How They Are Caught," Scientific Ameri can. October 1998. (The first article of several in this issue about computer break-ins and security.) Weber, R. Information Systems Control and Audit, Upper Saddle River, NJ: Prentice-Hall, 1999. (An excellent text on audit and control.)
DISCUSSION QUESTIONS 1.
What are senior management' s problems in controlling information processing? should users worry about a virus? 3. How can users avoid getting a virus on their PCs? 4. What is the difference between a virus and a worm? 5. Why is control over systems important for users? 6. What are the issues in managing and controlling data, given today's trends in technology? 7. Will controls ever completely protect systems? 8. What are the major control systems that exist in most organizations? 9. What are a manager's concerns with respect to a budget for IT activities in his or her department? 10. What kind of backup plan would you recommend for fellow students? 11. What are the threats to an interorganizational system? 12. To what extent do security concerns inhibit electronic commerce? What are some solutions? 13. Have computer systems made fraud easier? Do you think that more or less can be em bezzled from a computer system than from a manual system? 14. Is there any way to detect fraud if there is widespread collusion among IS personnel and management? 15. Why do you think viruses are created and spread? 16. What problems can viruses cause a PC user? 17. What kind of file backup procedures are needed in the average organization? 18. Can a worm hurt a LAN that operates only within a company? 19. Why audit a system? 20. Why do companies create "fire walls" between their systems and the Internet? 21. Can an information system be overcontrolled? What might happen under such conditions? 22. Describe how a virus actually works. What kind of files does it want to infect? 2. Why
CHAPTER 23: MANAGEMENT CONTROL OF I N FORMATION TECHNOLOGY
23. What
do you think of computer "break-ins?" Are they harmless pranks, or do they cause seriou'S damage? 24. What devices does management have to control the organization? 25. How does organizational structure influence control? 26. How do budgets exert control?
CHAPTER 23 PROJECT
Organ izational Contro l In 1 995, Barings Bank in London went out of business because of a trader in Sin gapore who made a large number of risky, unauthorized trades; that is, the indi vidual lost money and then continued to trade beyond the trading limits set by the firm. The trader was evidently convinced he could "make up" the losses by more trading. Unfortunately, more trading led to more losses until someone finally no ticed the problem. Barings, a venerable British bank, was purchased by a Dutch financial institution that replaced all of Barings' senior officers. See the box on page 644 in this chapter. Since these events , "risk exposure" systems have become popular. First, de scribe the organizational control problem faced by a securities firm. Then consider to what risks the firm is exposed. Finally, develop a high-level design for a system to monitor those risks and report to management. What kind of control does your plan represent? How can information technology help management reduce risk?
649
CHAPTER 24
I I
Outline Management in a Technological Environment
What Do CEOs Think? A Political Model of Information Technology The Chief Information Officer The Corporate IS Department A Vision and Plan for IT Outsourcing as a Strategy How Much to Invest in IT Estimating Value Making the Investment Decision A Summary of Issues in Managing IT The Changing World of Information Action Plan
Use IT Design Variables to Structure the Organization Determine and Communicate Corporate Strategy
Focus on Change
We have discussed how various firms use IT to transform themselves and their in dustries. The key to making this happen is management. Management must lead the IT effort and see that technology is used to make the kind of changes that will 650
CHAPTER 24: INFORMATION TECHNOLOGY ISSUES FOR MANAGEMENT
keep the firm competitive in the future. An important message for management is to view information technology as a resource to be used in managing the organiza tion. Rather than seeing IT as an expense to be minimized, consider how technol ogy can be used as a part of strategy to change existing businesses and to under take new initiatives. Information technology has become an integral part of the way organizations function. Success in the future may well depend on how well the organization manages information technology. MANAGEMENT IN A TECHNOLOGICAL ENVIRONMENT
No matter what their functional area, managers today and in the future will face a highly technological environment. The costs of processing logic and communica tions networks are so low, and the potential of this technology so high, that the proliferation of technologies will continue to accelerate. How will we manage under this increased level of technology? What are the management challenges? What Do CEOs Think?
CEOs, according to surveys, want their IS departments to produce fast and flexible systems that impress customers and increase markets. The majority of CEOs re port using a PC and almost 50 percent of companies do some outsourcing for IT services, the major reason being cost savings. Unfortunately, about half of the CEOs and CFOs surveyed said they are not getting an adequate return from their investments in IT. This level of dissatisfaction is a serious problem given the huge amounts of capital invested in technology. What can management do to improve the effectiveness of the technology effort? A Political Model of Information Technology
Table 24- 1 describes a political model of information technology in the organiza tion (Davenport et aI., 1992). Firms characterized by technocratic utopianism are fascinated with the tech nology. There is an assumption in the firm that technology will solve all problems. The firm will develop databases, desktop workstations, and networks, and pur chase large amounts of software. This organization often lacks a vision of how all of this technology will be used to further its objectives. Anarchy results when technology is not managed. Management abrogates its re sponsibilities to control IT and "lets a thousand flowers bloom." This strategy may encourage the bold to acquire computers and connect them, but as the firm matures, the lack of overall planning and standards will create tremendous problems. Many firms practiced this style of management in the early days of PCs, letting users pur chase whatever equipment they pleased. As a result, these firms found it very diffi cult and expensive to connect their diverse computers to a network. In the feudal model, powerful executives control technology within their divi sions and departments. These executives determine what information to collect and choose the technology for their fiefdoms. They also make the decision on
65 1
652
PART SIX: ISSUES FOR SENIOR MANAGEMENT
TABLE 24· 1
INFORMATION POLITICS
Technocratic utopianism
Reliance on technology; model the firm's IT structure and rely on new technologies
Anarchy
No overall information management policy
Feudalism
Management of IT by individual business units; limited reporting to the corporation
Monarchy
Strong control by senior management; information may not be shared with lower levels of the firm
Federalism
Management through consensus and negotiation about key IT decisions and structures
what infonnation to forward to higher levels of management. This model is most often found when the finn stresses divisional autonomy. Because it is unlikely that two chiefs will follow the same model, again it can be very difficult to coordinate different feudal systems if senior management decides that coordination is a more appropriate technology strategy. In a monarchy, the CIO becomes the CIC, the chief information czar. Instead of playing the consultant role, the CIO establishes and enforces standards that will be followed throughout the corporation. The monarchy often emerges when the finn finds that it has suffered too long from the feudal model. A possible halfway point between feudalism and a monarchy is a constitutional monarchy, in which a document sets out the powers reserved to senior management and those that fall to the divisions. In today's environment, the federal model may be the most appropriate. The finn tries to reach a consensus on which IT decisions belong at each level and how infonnation should be shared. The emphasis is on which policies make the most sense for the corporation as a whole, not just for a specific department or division. Senior management recognizes that local divisions need some autonomy; local managers recognize that infonnation belongs to the company and may often be of great strategic value. In most cases, it makes sense for infrastructure like networks to be designed and operated centrally. If there are many opportunities to share systems across di visions, corporate management will encourage a strong role for a central IS group. Also, if the divisions have line managers who have little knowledge of IT, a central group has a major role to play in helping the divisions. In the case of very dissimi lar divisions where there is little opportunity for sharing, we would expect to see the local unit have a lot of responsibility for IT decision making. A central IT group will provide some coordination, but most decisions will be left to local man agers. This decentralization will be more pronounced if local managers are very knowledgeable about infonnation technology.
CHAPTER 24: I N FORMATION TECHNOLOGY ISSUES FOR MANAGEMENT
A
a
The information technology industry is help ing to drive the American economy; technol ogy stocks have been responsible for a steady, dramatic increase in the stock mar ket. One expert estimated that technology is responsible for 5 percent of the Gross Do mestic Product in the U .S. Jobs in this area are growing rapidly as well. Manufacturing firms are busy downsizing while entrepre neurial companies are adding employees. A good example is United HealthCare (U HC), a $2.5 billion Minnesota healthcare company. UHC does not employ physicians or own the hospitals in its net. The company facilitates relationships among health care providers, insurers, and patients; its objec tive is to achieve the highest possible care at
the lowest cost. One officer described the firm as a "brokerage service" and a ''technol ogy company." A major system interconnects almost 25,000 independent physicians and UHC facilities in North America. The company has won a patent for applying AI techniques to monitoring clinical databases. The com pany is in the throes of designing a new ar chitecture for client-server computing with distributed U nix-based applications. The company is steadily expanding and adding workers. Other technology companies are experi encing similar growth; knowledge of IT can add a great deal to your resume when you are looking for a job!
The Chief Information Officer
The increased importance of IT to the firm has led to the creation of a chief in formation officer (CIO) position. This individual, of course, is in charge of in formation technology in the firm. However, the chief information officer is also an influential member of senior management and is usually a vice president or senior vice president in the firm. In addition to traditional information process ing, this individual is responsible for voice and data communications and office technology. The job demands someone who can assume a role in planning, in fluencing other senior managers, and organizing information activities in the organization. The issues discussed in this text are the concerns of the CIO. He or she must worry about strategic planning for the corporation and how information technol ogy can provide a competitive edge. The executive in this role must provide lead ership and control over processing. It is important that planning, systems develop ment, and operations are all undertaken successfully. The CIO is a relatively new position in organizations, but more and more firms are expected to create such a post. A large firm might spend in the hun dreds of millions or even more than a billion dollars a year on information tech nology. A manager, not a technician, is needed to obtain a return from this kind of investment. Earl and Feeny (1994) describe ways in which CIOs should try to add value to their organizations. They found two types of CEOs, those who see IT as a strategic
653
654
PART SIX: ISSUES FOR SENIOR MANAGEMENT
TABLE 24·2 PERCEPTIONS OF IT
Issue
IT, a Cost/Liability
IT, an Asset
Are we getting value for money invested in IT?
ROl on IT is difficult to measure; the organization as a whole is unhappy with IT.
ROI is difficult to measure; the organization believes IT makes an important contribution.
How important is IT?
Stories of strategic IT use are dismissed as irrelevant to this business.
Stories of strategic IT use are instructive.
How do we plan for IT?
IT plans are made by specialists or missionary zealots.
IT thinking is subsumed within business thinking.
Is the IS function doing a good job?
There is general cynicism about the track record of IS.
The performance of IS is no longer an agenda item.
What is the IT strategy?
Many IT applications are under development.
IS efforts are focused on a few key initiatives.
What is the CEO's vision for the role of IT?
The CEO sees a limited role for IT within the business.
The CEO sees IT as having a role in the transformation of the business.
What do we expect of the CIO?
The CIO is positioned as a specialist functional manager.
The CIO is valued as a contributor to business thinking and business operations.
Source: Earl and Feeny, 1 994.
resource and those who see it as a cost. Table 24-2 presents various issues in man aging IT as seen by CEOs in these different positions. If you are the cra of a firm whose CEO holds the views in the middle, liability column, then the job will indeed be challenging. Earl and Feeny argue that the CIa must find a way to add value to the corporation from its use of IT so the CEO will view IT as an asset. One role of the CIa is to determine if success stories from other industries or from competitors are relevant to the company. In one chemical company, man agers dismissed stories of competitive advantage from IT saying they were not ap plicable in their industry. Unfortunately, at the same time a competitor was devel oping technology that gave it a competitive advantage. It appears the most successful approach to obtaining benefits from IT is not to identify separate IT and business strategies; rather, business strategy subsumes IT strategy. The job of the cra is to build relationships with other functional man agers so IT requirements become a part of business strategy. This approach means the CIa has to be involved in planning and strategy meetings across the company. To provide confidence in technology, the CIa must build a track record of deliver ing IT as promised, on time and within budget. Users quickly become cynical when delivery dates, cost estimates, and functional specifications do not meet expectations.
CHAPTER 24: I N FORMATION TECHNOLOGY ISSUES FOR MANAGEMENT
TABLE 24·3 ADDED VALUE OF THE CIO
1. 2. 3. 4. 5. 6.
Obsessive and continuous focus on business imperatives. Interpretation of external IT success stories as potential models for the firm. Establishment and maintenance of IS executive relationships. Establishment and communication of IS performance record. Concentration of the IS development effort. Achievement of a shared and challenging vision of the role of IT.
Source: Earl and Feeny. 1 994.
Rather than scattering the development effort, a well-run company focuses its IT efforts on opportunities and areas where the firm is weak. The task of the CIa here is to determine not how to use IT, but rather where it should be used to most benefit the organization. The CIa has to be a promoter, marketing the potential of IT to transform the or ganization. A track record of delivering what has been promised will increase this manager's credibility as will good examples of organizations that have undergone technology-driven transformations. Table 24-3 summarizes the characteristics Earl and Feeny found among CIas for firms that considered IT to be an asset rather than a liability. This table shows how the CIa can add value to the organization. The CIa of Time Warner spoke at a recent NYU class about his role in the company, and his comments provide further insights on adding value. According to this CIa, he adds value by finding new business opportunities for the company and using technology to conduct business in new ways. The company manages IT in a federal structure so he takes responsibility for infrastructure like a worldwide network. IT managers in each division develop systems for their divisions and worry about the day-to-day operation of their systems. A central IS group is likely to function in several capacities, as these examples illustrate. First, it will be a brokerage for applications packages. In some cases it will choose a standard, for an office suite for PC applications or a groupware product. It may also encourage the organization to adopt one enterprise software package such as the ones offered by Baan, SAP, PeopleSoft, or aracle. The cen tral group may also act as a systems integrator, making the hardware and soft ware systems from different vendors work together. The role of the CIa will dif fer among companies, but first and foremost this person has to be a manager concerned with the business as well as someone who understands information technology. The Corporate IS Department
Many organizations have a corporate information services department and separate IS departments at different physical locations. What are the responsibilities of such
655
656
PART SIX: ISSUES FOR SENIOR MANAGEMENT
a department? First, it is staffed with operations, maintenance, and development personnel. The operations group is responsible for the ongoing operation of the in frastructure, including computers and communications networks. They run "pro duction" jobs that process transactions and produce financial reports. This group in stalls new computers, expands networks, and keeps software up to date. We have discussed systems development and the tasks of developers. Maintenance staff members make changes to existing applications to enhance them, and they repair errors that appear in programs. There has been a shift in the activities of the corporate IS department over time as the technology has moved from a focus on mainframes to the desktop. Origi nally, the corporate group controlled almost all of the firm's IT budget. Today they may be responsible for 50 percent or less of technology investment as other man agers purchase technology from their budgets. Most organizations are content to have a central group provide and maintain infrastructure, the underlying network of computers and communications networks, for the firm. The role of a central group in developing applications of technology varies among organizations as dis cussed earlier in the chapter. A firm can decentralize and leave applications devel opment to users, it may centralize this activity, or it may adopt a combination ap proach in which the central group consults with users who undertake their own development projects. A Vision and Plan for IT
One task of a CIO is to be sure there is a vision in the firm for what IT can accom plish and a plan to provide a guideline for management decisions about technol ogy. A vision is a general statement of what the organization is trying to become. A vision might describe, possibly in scenario form, the environment seen by a user. "We will use information technology to support our strategies of providing the best customer service in the industry and becoming a global firm. Our first pri ority is to develop electronic links with customers and suppliers. Next, product brand managers will be furnished with a client workstation that can access the sales database. They will be provided with decision-support tools to conduct their own analyses of global data. Product development engineers will have worksta tions capable of running the CAD/CAM software . . ." A vision might include a statement about the kind of technology architecture the firm hopes to provide, say, a client-server environment and a global network for communications. The vision needs to be sufficiently compelling that it creates enthusiasm for the plan to achieve it. In Chapter 5, we suggested that it was important for IT strategy to be sub sumed as a part of overall business strategy. Corporate and IT strategic planning should be part of one planning effort. The IT plan expands the IT component of the strategic business plan and describes how to execute the agreed-upon strat egy. This plan must combine the vision of IT with strategy to produce a doc-
CHAPTER 24: I N FORMATION TECHNOLOGY ISSUES FOR MANAGEMENT
ument that guides IT decision making. Suppose the overall strategy of the com pany is to become the low-cost producer in its industry. This strategy is to be achieved by reengineering existing processes and installing automated produc tion equipment in manufacturing plants. The vision of the firm in five years is to have process owners in charge of business processes that have extensive tech nology support. The overall architecture is client-server, with a network con necting all plants and office locations. In addition, to pursue its low-cost pro ducer strategy, the company will establish electronic links with key customers and suppliers. Thus, the vision and strategy provide the goals for an IT plan that will describe how to achieve them. This more operational plan will depend on the company and its strategy, but in general it will discuss hardware and software, communications, and individual applications. Continuing the example above, the plan would detail the equipment needed to move toward the client-server model and a schedule for implementation. This section would also discuss networking, including the hard ware and services required to provide communications. A key role of the plan is to identify the most important new applications of technology and prioritize them. It is important to focus efforts on applications that contribute to achieving the vision and strategy of the company. For the exam ple above, do not be too concerned about routine applications. Management will probably decide resources should be applied to one or two reengineering projects and an effort to develop EDI with customers and suppliers. The plan would de scribe each of these projects in some detail including cost, time, and staff require ments for completion. If management decides it wants to undertake more applica tions than there is staff available, some of the development will have to be outsourced. Having a plan makes managing IT requests easier for the CIa and for manage ment in general. The rapid diffusion of technology has led to a flood of ideas and requests for how to use IT. The typical organization cannot afford to undertake every application suggested. A manager can evaluate applications against the plan. Does this suggestion help us achieve our vision and strategy? Where does it fall given the priorities of our other projects? A well-prepared plan can create enthusi asm for IT, focus the technology effort on business imperatives as suggested above, and help manage and evaluate technology. The plan is a fundamental man agement tool for seeing that IT makes the maximum contribution to the organiza tion. Table 24-4 is an example of the contents of one corporate plan for informa tion technology. We recommend that a representative group of managers work together to de velop a plan for information technology and the organization. A plan developed by a CIa alone will probably not be acceptable to other managers. The CIa should act as a resource, consultant, and tutor for the planning committee. The idea is for technology not to be a separate plan, but to be integrated, and to some extent sub sumed, in a corporate plan.
657
658
PART SIX: ISSUES FOR SENIOR MANAGEMENT
In 1 993 Greyhound was under a great deal of pressure to show progress to financial an alysts. Senior executives had promised in vestors, lenders, and securities analysts that Trips, a computerized reservations system for bus travel, would be ready for the 1 993 summer travel season. The vice president in charge of Trips tried to warn the company's chief financial officer that a gradual rollout was necessary given problems on a test run of the system in four cities in Texas. Man agement would not listen. In fact, the vice president's report was destroyed, and its mention purged from computer files. In April, senior executives flew to Eu rope to promote a stock offering that was based on the promise of Trips. Greyhound rolled out the system that summer, and as the vice president in charge predicted, it was a disaster. In the old days, G reyhound allocated buses and drivers with data that was months old. It needed quick, reliable ridership data to determine how to set prices and how to allocate buses to routes. Margins were very thin, and the company could not afford to send almost empty buses on trips. Unfortu nately, a bus reservations system is more complicated than it sounds because of the number of possible stops. An airplane pas senger flying from Baltimore to Los Angeles
might make one stop, but the bus passenger on that route could make 10 or more stops. A bus reservations system must account for many more segments than an airline system does. Systems analysts estimated Trips would have to manage 1 800 vehicle stops a day, about 1 0 times those of an average air line. Because of heavy cost cutting, there was high tumover. Personnel using the sys tem would probably have little experience with the company and only have a h i g h school education. Greyhound gave the 40-person Trips de velopment group $6 million and a little over a year to develop a system. Contrast this to American's SABRE system which has been developed over 30 years by a large staff and probably represents an investment of over a billion dollars. An outside contractor devel oped the original software. Learning to use it took 40 hours of training for ticket clerks. The system did not include all Greyhound destinations, so clerks had to fall back to old log books at times. In tests, the new system took twice as long to generate a ticket as the old system. The systems group wanted to redesign the software, but was pressured by man agement to press on. When the system had been installed at 50 bus terminals, it froze terminals unpredictably. At the same time,
TABLE 24·4 CONTENTS OF AN INFORMATION SYSTEMS PLAN • • • • •
• • • • •
Executive summary Goals-general and specific Assumptions Scenario-information processing environment Applications areas-status, cost, schedule, priorities Operations Maintenance and enhancements Organizational structure-pattern of computing Effect of plan on the organization-financial impact Implementation-risks, obstacles
CHAPTER 24: I N FORMATION TECHNOLOGY ISSUES FOR MANAGEMENT
G reyhound decided to change its long distance phone service provider and set up a toll-free number for reservations for the first time. The reservations center opened with 220 terminals connected to Trips. The combi nation of the bus terminals and 400 opera tors in Omaha taking reservations seriously degraded the performance of the central Trips computers in Dallas. Some days the system took 45 seconds to respond to a single keystroke and five minutes to print a ticket. Crashes occurred so often that many agents wrote tickets by hand. Passengers sta n d i n g in l i n e at bus terminals to get computer-issued tickets often missed con " nections. Callers had to try up to a dozen times to get through to the toll-free reserva tions line. The slow system meant that oper ators had to spend 1 50 seconds on average on a call compared to 1 09 seconds before the system. By early September, Greyhound stopped using Trips west of the Mississippi River. At the end of the summer, Greyhound announced a 12 percent decrease in rider ship and that earnings would trail projec tions, causing its stock to plunge 24 percent in value in a single day. The vice president in charge of Trips was relieved of this re sponsibility. A new vice president was as signed to Trips, and he was forced to resign
in January of 1 994. Executives now admit that by introducing the ill-fated reservations system at the busiest time of the year, they drove away passengers instead of attracting them. The company failed to learn much from the summer of 1 993. In May of 1 994 it of fered riders the chance to go anywhere for $68 with a 3-day advanced purchase. Thou sands of customers responded, and Trips went down. Buses and drivers were in short supply, and some bus terminals were so swamped that agents just stopped selling tickets. By the fall of 1 994, the chief execu tive and CFO of Greyhound were forced to resign. A new executive from American Air lines is now in charge of Trips; it is working in 248 locations and beginning to provide planning data for the first time. Training time to use the system has been reduced from 40 to 1 6 hours, but even the new manager in charge of Trips reports trouble when he tries to use its cumbersome interface. Trips is a sad tale of bad technology de cisions, but first and foremost, bad manage ment decisions made by people who did not understand the limits and problems of tech nology. More discouraging is the fact that these senior managers did not try to learn from and did not listen to warnings from peo ple in a position to know the risks.
Outsourcing as a Strategy
Outsourcing involves turning over responsibility for some part of a firm's tech nology effort to an external company. We discussed this option earlier in Part Four when we looked at the problem of selecting alternatives for processing. In addition to obtaining services like systems integration for developing a specific application, a firm can outsource all or part of its IT effort. For example, a large brokerage firm outsourced the operation of part of its communications function to a common car rier. The brokerage firm did not want to maintain the internal expertise to operate and continually update the configuration of the network.
659
660
PART SIX: ISSUES FOR SENIOR MANAGEMENT
Loh and Venkatraman ( 1 992) have identified some of the factors that lead a firm to outsource: •
•
•
A firm that feels it is spending more on technology than it should (or more than the competition) may adopt outsourcing if it feels this option provides a lower cost alternative than internal management. Even if the firm does not feel at a disadvantage compared to others, it may see outsourcing as a way to reduce IT related costs in general. Several firms claim cost savings by turning their IT function over to an external firm. Another possibility is that large outsourcing agreements are motivated by companies' trying to return to profitability by cut ting employment. (A company outsourcing all its IT operations generally gets an immediate cash inflow when it sells equipment to the outsourcer, and the outsourcer usually hires a large percentage of the company's staff, reducing its salary expense.) A firm with a high-debt structure may not wish to invest in technology. It may view outsourcing as a way to lease technology instead of buying it. An organization may feel its IT function is not performing adequately. Out sourcing can be a way to arrange for a more professional and better performing IT operation in the company. Turner and Kambil ( 1 993) have added to this list:
•
An organization has decided to return to its core competencies. Managing IT is not one of these, so it outsources this task to another firm.
CHAPTER 24: I N FORMATION TECHNOLOGY ISSUES FOR MANAGEMENT
• The organization is interested in technology transfer from the expert outsourcing firm. It will learn from the outsourcer. Xerox outsourced the operation of its legacy mainframe systems to EDS in order to concentrate on developing new client-server applications. • A firm may outsource "commodity" processing to free its staff to develop new applications of technology.
How can outsourcing accomplish these objectives? The outsourcing firm must have a high level of expertise in technology. This firm should also be able to create economies of scale. For example, the telecommunications outsourcer can probably provide network services for a number of clients with a smaller staff than the sum of the networking staffs of its clients. What are the arguments against outsourcing? The outsourcing firm may have a high-cost structure because of its need to employ highly skilled personnel. The need to have a contract with the outsourcing firm can lead to conflict and misun derstandings. Some companies are surprised at the cost of using an outsourcing firm to develop applications. Probably the biggest deterrent to outsourcing is the question of control. If you regard technology as a competitive factor in business, you may be reluctant to tum control of it over to an outside firm. The brokerage firm described earlier exam ined the option of outsourcing all of its technology effort, but decided that only one part of it was not sufficiently strategic to be outsourced. Lacity and Hirschheim (1993) studied a number of firms that outsourced. Their criticism of outsourcing provides a cautionary note. Their study identified two myths of outsourcing. Myth 1 : Outsourcing vendors are strategic partners.
The outsourcing vendor cannot be a partner because the outsourcer's profit motive is not shared by the customer. The outsourcer makes more money if it is able to charge the customer higher fees. If the outsourcer can reduce service levels and collect the same fees, that also contributes to its profit margins. You might want to consider some kind of a cost-reduction sharing arrangement with an outsourcer so that both the services firm and the client benefit from more efficient operations. Myth 2: Outsourcing vendors are inherently more efficient than an internal IS department.
The outsourcer's argument here is that economies of scale help it to be more effi cient. Today hardware costs do not favor huge installations. As we have seen, the cost/performance ratio for smaller computers is better than for mainframes. It is possible that the outsourcer can do some tasks more efficiently because it has done them before or because it can afford to share highly paid specialists among a num ber of clients. An outsourcing agreement will probably extend for a number of years in order to justify the transition effort involved. All experts in this field suggest that devel oping a contract between the outsourcer and the client is crucial. Since an agree ment may be for five or ten years, the contract must be highly flexible. Business
661
662
PART SIX: ISSUES FOR SENIOR MANAG EMENT
conditions and technology are expected to change during the life of the agreement. General Dynamics, which has an outsourcing agreement with Computer Sciences Corporation, is reported to have eight contracts covering divisions that may each evolve in a different way (McFarlan and Nolan, 1 995). After entering a relationship with an outsourcer, the company still has to man age information technology! You will still need the equivalent of a CIO to manage the partnership and contract with the outsourcer. Xerox reportedly has a dozen people managing its $3 billion, l O-year contract with EDS. The client still must look at emerging technologies and plan for its technology architecture. Creative applications are most likely to come from users rather than the outsourcer, and there must be mechanisms for turning ideas into new applications of the technol ogy. Outsourcing can be an excellent alternative for some companies, but you should not enter into an outsourcing arrangement with the idea that you will no longer have to manage IT. How Much to Invest in IT
Most firms are not in the business of developing technology. They have a product or service to offer, and the technology helps them accomplish the mission of the organization. Overall in the United States, the Department of Commerce estimates that 45 percent of capital investment is for information technology. Still, managers ask how much they should invest in IT. A better question is how much benefit can the organization obtain from its investment in technology? The first question looks at IT as a cost, the second as an investment. You will undoubtedly be asked to justify an IT investment at some point in your career. In Chapter 3 we presented the Investment Opportunities Matrix, Table 3-4, which describes different types of investments the firm might make in IT. This dis cussion also suggested that each investment has a different probability of produc ing the benefits anticipated from the IT innovation. The probability is fairly high of getting a return from an investment like Chrysler's EDIIJIT efforts; the firm is unlikely to obtain a return from producing a report required by OSHA. Estimating Value
Chapter 16 introduced the notion of conversion effectiveness and made the point that we are not always 100 percent successful in turning an IT investment into a finished application. This reasoning suggests that the probability of successfully obtaining a return must be weighted by the probability that an IT investment will have a return and the probability of conversion success. If we assume that the probability of a return on an IT initiative based on the investment type is inde pendent of the probability of converting the investment into a successful applica tion, we get the following IT Investment Equation: P(SuccesslReturn) = P(Return on Investment Type) x P(Conversion Success)
(1)
where P means "probability of." The IT Investment Equation says that the proba bility of obtaining a return on an investment in information technology equals the probability that the type of investment you are making has a return times the
CHAPTER 24: INFORMATION TECHNOLOGY ISSUES FOR MANAGEMENT
probability that you will be successful in converting the investment into a work ing IT application. Equation ( 1 ) calculates the SR index, the probability of a suc cessful return. A few examples will help to illustrate what the equation means. In Table 24-5 there are four colunms. The first is the type of investment. The second is an esti mate by management and the IT staff of the probability that there will be a return given the nature of the investment. The third column is the probability of a suc cessful conversion of the investment into a functioning system. According to our reasoning and the IT Investment Equation, the product of these two probabilities gives the overall probability of obtaining a return from this investment. The table illustrates how difficult it can be to obtain a return from IT investments. For a hypothetical budgeting system, management feels there is only a 50 percent chance the organization will obtain any return since the new application replaces an old budgeting system. It has a nicer interface and better reports, but managers could not honestly say the system will help them make more money. The 50 percent fig ure is based on the belief that there will be some labor savings. The IT staff thinks the package will be easy to implement and estimates a 100 percent chance of suc cessful conversion. The probability then of a successful return on this investment is 0.5 x 1 .0 or 0.5. In the second example, management is sure from seeing the results at other companies, that an EDIIJIT system for its factories will have a significant, measur able return. They are certain enough to estimate the probability .95. The IT staff, however, is a little concerned with the scope of the project and is only willing to estimate a probability of .75 that it can implement the system so all the benefits occur. The probability of a successful return, then, is .95 x .75 or .7 1 .
TABLE 24-5 EXAMPLES OF USING THE IT INVESTMENT EQUATION
Type of investment
Management and IT staff estimate of probability of a return based on the type of project
Estimate of probability of successful conversion effort
Overall probability of a return: the SR Index
Budgeting system
0.5
1 .0
0.5
JIT/EDI system
0.95
0.75
0.71
I nfrastructu re network
0.5
0.7
0.35
Package tracking system
0.2
1 .0
0.2
Groupware
0.9
0.8
0.72
Web order entry
0.9
0.7
0.63
Web home pages
0
1 .0
0
663
664
PART SIX: ISSUES FOR SENIOR MANAGEMENT
The rest of the table illustrates other hypothetical scenarios, an infrastructure in vestment, an overnight delivery firm investing in a package tracking system, order entry on the World Wide Web, and Web home pages. Note the probabilities and how each one has a substantial effect on the probability of a successful return from investing in IT. Anything less than a probability of i for a return on the type of in vestment and a probability of i for conversion success dramatically reduces the probability that you will be successful in obtaining a return on an iT investment. Almost all IT initiatives involve some estimate of costs and benefits so that those making the decision to invest have a sense of the dollars involved. Managers are in the position of having to predict the return for specific investments in tech nology proposed by various actors in the organization. If we look at Table 3-4, the difficulty of making these estimates is evident. For applications that offer a direct return, estimates, by definition, are not too difficult, particularly when compared with the case of indirect returns. It has been suggested that infrastructure investments provide you with the opportunity to un dertake some initiative in the future; you are buying an option to invest again. But how much is that option worth? What is its price and where is the market for it? What is the estimated return for a system that is a competitive necessity? For tech nology when it is the only way to do the job? Some experts suggest that you should look at the cost of not investing. What would happen to a new bank that failed to deploy ATMs? Could it remain in busi ness? Would it end up being unable to build market share? If a valued customer says you must implement an EDI package, the cost is clear: losing the customer's business. Does that amount of business become the return on the investment in IT? Managers usually do not think in terms of probabilities; they prefer dollar esti mates. However, if there are probabilities involved, the decision maker should weight the dollar estimates with the probability of actually realizing the dollars. If a geologist tells an oil company executive that there is a 60 percent probability a field contains oil that is worth $100 million, what revenue should the executive ex pect to receive from the field? The executive's expected value is the probability the field has oil times the value of the oil, or .6 x $100 million, which is $60 million. In general, expected value is the amount expected times the probability that you will receive that amount. In addition to estimating the probability of a return in the Investment Opportu nities Matrix, most companies would try to estimate the dollar returns from invest ing in technology. Typically, these returns are cost savings, cost avoidance, and/or new sources of revenue. If you estimate that the EDIIJIT system in Table 24-5 will save the company $1 million in its first year, then the actual expected savings will be your estimated savings times the probability of a return times the IT staff esti mate of conversion success, or $ 1 million x .95 x .75 = $71 2,500. This reasoning leads to the iT Value Equation: Expected Return = Estimated Return x P(Return) x P(Conversion Success) Estimated Return x P(SuccesslReturn) or Estimated Return x Equation I =
=
(2)
CHAPTER 24: INFORMATION TECHNOLOGY ISSUES FOR MANAGEMENT
where P means probability. The IT Value Equation shows that the expected return from an IT investment is rarely the amount estimated by those involved; it must be weighted by the probability of obtaining the return and the probability of success fully converting the investment into a working application. Making the Investment Decision
Table 24-6 presents information for making decisions about IT investments. This spreadsheet combines information from the Investment Opportunities Matrix, the IT Investment Equation, the IT Value Equation, and capital budgeting techniques. The table is an example of the information that management could use in making IT investment decisions. There are two capital budgeting techniques that have been used or proposed for making IT investment decisions. The first is the well known net present value approach or NPV, which figures out the net present value of income and expenses using the firm's cost of capital, and compares the two to see if the result is positive or negative. A project with a positive NPV re turns a value in excess of the firm's cost of capital. A second approach is to use an options pricing model that looks at an investment in IT as providing an option for making a future investment. This approach is new and somewhat controversial; it presents an interesting framework for thinking about IT investments. Table 24-6 identifies IT initiatives in a hypothetical example and describes their type. (One initiative might fit into more than one type, which makes for a slightly more complicated analysis; however, the same approach applies.) The fourth col umn of the table is an estimated return from the project. The next two columns are probability estimates, the first being the probability that this project, given its type, will have a return. The second probability is for conversion effectiveness; what is the risk of this initiative? How likely is it that the organization can implement it successfully to meet specifications? The SIR index comes from the IT Investment Equation: It is the product of the probability of a return and the probability of successful conversion and represents the likelihood of a successful return. The expected value comes from the IT Value Equation; it is the Estimated return x the Probability return x Probability Conver sion Success (or Estimated return x SIR index). The Capital budget model column contains the results of applying a budgeting technique to the data in the table. Note that these techniques do not necessarily apply in every instance. The rightmost column in Table 24-6 comments on the possible upside benefits of the investment. The table contains a variety of projects for a rather diversified, hypothetical holding company. The company convenes an IT steering committee as needed; one of its tasks is to approve suggested projects. One can look at present IT in vestments from the budgeting system to Web home pages and the proposed IT investment for an Intranet shown in Table 24-6 as a portfolio of IT projects. Management should try to balance this portfolio on several criteria. For exam ple, it is unlikely that one will obtain great value if all conversion probabilities are very low, or if all expected values are small. The SIR index provides an
665
en
=
Proposed Intranet
I nfrastructu re
$1 60,000
$1 00,000 $1 00,000 $ 50,000
$750,000
Competitive necessity Indirect Direct Competitive
Groupware Web order entry Web home pages
$ 20,000 $300,000 $1 00,000
Required Direct Infrastructure
Budgeting system JIT/EDI system Infrastructure network Delivery tracking
Cost
Type
Name
A DECISION WORKSHEET
TABLE 24·6
$
60,000
$ 50,000 $ 500,000
$1 ,000,000
$ 20,000 $ 500,000 $ 75,000
Estimated return
0.80
0.90 0.90 0.00
0.40
0.50 1 .00 0.60
Probability of return
0.90
0.80 0.70 1 .00
1 .00
1 .00 0.75 0.80
Probability conversion success
0.72
0.72 0.63 0.00
0.40
0.50 0.75 0.48
Probability SIR
$ 43,200
$ 36,000 $31 5,000
$400,000
$ 1 0,000 $375,000 $ 36,000
Expected value
$ $
( 1 5 , 1 87) 37,608
$ 1 44,8 1 3
$1 ,055,929
$ 957,058 $ 1 20,678
Capital budget model
Internal Intranet Present value 5 year savings NPV original proposal Options Price experiment
Restructure firm? Reduce costs $500,000 Experience for e-commerce
Prevent market share loss
None Expand $5 million savings Allow future applications
Upside
CHAPTER 24: INFORMATION TECHNOLOGY ISSUES FOR MANAGEMENT
overall evaluation of the opportunity to create value from IT. Comparing a pro posed project with the existing portfolio provides a picture of its contribution to the firm's efforts to obtain value from IT. In the past, the steering committee made decisions on all the projects in Table 24-6 except the last one, the proposed Intranet. We review two past decisions to set the stage for discussing a new initiative for an Intranet. The budgeting system falls into the "required" category of application. Both the company's accounting firm and its controller argued persuasively that the old budgeting system was no longer suitable. The cost of this system is rather low since the company identified a package for $10,000, and it estimated that no more than another $10,000 would be required to implement the package. The controller estimated an annual saving of $20,000 in reduced clerical costs once the package is implemented. However, she lacked confidence in her estimate given this type of investment and the required nature of the application; she estimates a 50 percent probability of a return. The IT staff was very confident that it could successfully install the system; they rate the probability of conversion success as 1 . The steer ing committee approved the system because its cost was low and because the con troller made a strong argument that such a system was required for the business. The JITIEDI system for one of the company's manufacturing subsidiaries required lengthy discussion because of the size. of the investment. Based on visits to other companies using this approach, the IT staff felt that their company could expect to get all the estimated returns (probability of a return = 1 .0); they also estimated a 75 per cent probability of successful conversion. Given a project with an expected annual value of $375;000 ($500,000 x 1 .0 x .75) and a $300,000 investment, there was no question about the economics of the proposal. The capital budget column shows a present value of a little under $1 million using a five-year planning horizon and a 1 5 percent cost of capital; the NPV is $957,058 - 300,000 or $657,058. The major issue for the steering committee was the $300,000 investment and the demands this system would place on the IT staff; A system of this size, done in-house, might pre clude some other IT initiatives, or force the firm to go outside for them. The steering committee approved this proposal because of its favorable financial projections and the upside possibility of even larger savings from expanding the system in the future. The steering committee held similar discussions about the other projects in the table, using the information provided as a basis for evaluating the projects and making a decision. How might they approach the proposed Intranet? The pro posal looks very attractive compared to the projects already under way or com pleted. It has a high SIR index with a good probability of conversion success and of obtaining a return. The subsidiary requesting the Intranet classified it as an in frastructure expense. The subsidiary would gain from making information avail able throughout its operations and estimated that it could save $60,000 a year in paper and publishing costs. The NPV analysis shows a five-year value of $ 1 44,8 1 3 using a 15 percent cost of capital; the NPV is this amount less $ 160,000, or -$ 1 5 , 1 87. The NPV in this case is negative. The subsidiary then recast its analysis of the Intranet in an options pricing model, even though it recognizes that this approach to IT investments is controversial. First
667
668
PART SIX: ISSUES FOR SENIOR MANAGEMENT
A The supply chain provides the materials that a company needs to produce a product or service. It consists of the vendors with whom the company does business. Supply chain management is the process of acqu i ring needed materials and services from ven dors, coordinating deliveries, assuring qual ity, and trying to minimize costs. One way to better manage the supply chain is to provide vendors with information rather than just or ders for goods. Cisco Systems, a leading manufacturer of communications equipment for the Inter net, is providing its suppliers with access to its product database over the Internet. In stead of viewing the supply process as a single chain, the company is trying to cre ate a "web of suppliers" that is an exten sion of Cisco itself. One consulting firm es timates that the cost of planning production levels, f i n d i n g raw mate rials, h a n d l i n g
inventory, and delivering products t o mar ket cost the average man ufacturer over 1 4 percent of reve n u es. Using the Web to coordinate the supply chain can stream line or eliminate manual processes. How ever, the real benefits of automating pur chasing and moving it to the Web come in attracting more competitive bids and reduc ing inventory. With I nternet connections to customers and suppliers, a man ufactu ring firm can avoid bringing some components into its own inventory. If you order a PC from Dell with an HP printer and a set of speakers, the computer comes from Dell and the other components come directly from their manu facturers. Dell has a ''virtual'' supply chain for these additional products. I nformation and communications technologies are powerful tools for the manager who wants to change business processes.
the analyst determined that the company could develop a prototype for $30,000. This test Intranet would give enough information for deciding if the original pro posal should be undertaken. At the end of the prototype development in a year, the company would need to invest another $100,000 to develop the full Intranet. The final results of her calculations in Table 24-6 show the value of the option as $37,608, which is more than its cost of $30,000. Given this additional information from the options pricing model, it is likely that management will approve at least the prototype Intranet. Given the amount of money at risk, the firm might decide to proceed with the full project because the evidence for benefits from Intranets in general is very positive. In addition, the steering committee has been very supportive of Internet-type initiatives. Table 24-6 shows that different criteria apply to project approval, depending on the type of investment. In some cases, quantitative analysis is very appropriate; in others, decision makers responded to qualitative factors. There are some compa nies that insist on a positive net present value before undertaking any IT project. While this rule probably sounds good to management and shareholders, Table 246 suggests that these companies may be missing a lot of opportunities (at least if they are being honest in their NPV analysis). If a firm insists on a cost benefit, NPV, or even options pricing analysis, it is likely to ignore proposed investments in several of our categories and some opportunities with considerable upside potential. In particular, it is hard to come up with credible
CHAPTER 24: INFORMATION TECHNOLOGY ISSUES FOR MANAGEMENT
quantitative evaluations of infrastructure, initiatives with indirect returns, strategic ap plications, and investments that may transform the organization. Every proposal should be evaluated, but decision makers have to use criteria that are appropriate for the type of investment proposed. A Summary of Issues in Managing IT
This book is about information technology and management. At this point we summarize some of the key management issues discussed in the text: • The personal involvement of management in making decisions about technology is crucial, especially given the huge investments most companies have made and continue to make in information technology. • You can use information technology to transform the organization. IT design variables let you develop entirely new structures like the T-Form organization. • Information technology should be an integral part of a firm's corporate strategy. Managers and other users are the most likely source of strategic applications of the technology. • Senior management needs a vision of how technology can be used in the firm. • A corporate plan should include planning for IT. • Management has the responsibility for des.igning and managing an IT archi tecture. It has to provide the basic infrastructure needed to take advantage of technology. • There are a number of different structures for managing IT. Today the federal structure is probably the most popular in a large organization. • Management is also responsible for developing new applications of technology. It needs to focus development resources where they are most needed. • Systems development is one of the most creative activities in modern organizations. Managing development projects has been a continuing challenge for companies. • Reengineering focuses attention on business processes instead of functions. It also contrasts radical redesign with incremental improvements in processes. • Management must decide on the source of IT services; for example, there is the option of outsourcing to another firm. • Managers determine what level of support to provide users working with technol ogy, and how much time users should spend developing applications themselves. • Managers are in the business of change. Nowhere is change more evident than in implementing new technology and using IT to redesign organizations. • Information technology, while easy to use in some respects, is constantly growing more complex. There is a continuing need for IT professionals in the organization. THE CHANGING WORLD OF INFORMATIC)N
The percentage of IT expenditures controlled by the professional IS group has steadily dropped. A corporate IT group is likely to be responsible for "legacy" systems (older systems, often for mainframes), corporatewide applications, and infrastructure technology such as networks. More and more, the responsibility for IT management is shifting to users and line managers.
669
670
PART SIX: ISSUES FOR SENIOR MANAG EMENT
The challenge for senior management in this changing world is to exert the proper amount of influence on and oversight of an increasingly complex technolog ical environment. The hardware and software infrastructure is expanding rapidly as networks of servers and workstations grow (our business school has a network with more than 1000 nodes). It is difficult to keep track of, much less manage, all the software and applications that local units develop for their own benefit. Senior management will continue to struggle with the balance between what appears to be critical for the organization and should be controlled centrally, and what is best left to local management. The trends that are likely to continue are the declining cost of hardware, the explosive growth of networking, the Internet, interorganizational communications, the development of more sophisticated soft ware packages, and the desire of users to do more computing under their own control. ACTION PLAN
It is very difficult to reduce suggestions for managing something as complex as in formation technology to a few outline points. However, the following suggestions have proven helpful as guidelines.
CHAPTER 24: I N FORMATION TECHNOLOGY ISSUES FOR MANAGEMENT
Use IT Design Variables to Structure the Organization
One of the most exciting attributes of modern technology is your ability to use it in designing innovative and highly effective organizations. You can use this tech nology to design components of an organization or to structure an entirely new type of organization. • IT design variables, in conjunction with conventional organization design vari ables, provide you with tremendous flexibility in designing an organization. • The most likely outcome from using these variables will be a flat organizational structure with decentralized decision making. The firm will use electronic com munications and linking, as well as electronic customer-supplier relationships to form alliances with other firms, and in general it will resemble the T-Form or ganization described in Chapter 4. Determine and Communicate Corporate Strategy
If you and others in the organization are to help the firm achieve its strategy, you must know what it is ! Develop a plan for how to use information technology. The plan should include: • • o
•
A list of opportunities for your business unit. A vision of how your unit should function and the role of IT in that vision. A survey of current business processes that are good candidates for major improve ment through process reengineering. A catalog of areas for applying IT, including priorities.
Develop a long-range plan for the technological infrastructure. o
• o o
Plan for hardware-software architecture for your unit given the constraints of the corporation, that is, what technology already exists. Plan for the evolution of a network that forms the backbone of your technology. Invest in infrastructure. Investigate the use of standards to facilitate connection and interorganizational ,systems.
Develop ongoing management strategies for IT. o o o
Support users in your unit and encourage them to work with the technology. Develop mechanisms for allocating resources to IT. Encourage innovation and reward it.
Manage systems development. o o • o
See that design teams are formed for new projects. Participate in the design process. Be sure you understand what IT applications will do. Review and monitor development projects.
Be a user of technology. o o
Use IT to improve your own productivity. Use technology to set an example for others.
671
672
PART SIX: ISSUES FOR SENIOR MANAGEMENT
Information technology is so pervasive in modern organizations that any manager will encounter it throughout his or her career. You will have the most success if you (1) look at IT as something that allows you and your colleagues to be more ef fective, and (2) actively manage information technology. CHAPTER SUMMARY
1. The future of the modern organization is inextricably intertwined with infor mation technology. A successful general manager cannot afford to leave deci sions about information systems to a group of IS professionals. 2. A political view of the IT organization suggests that the federal model is the most favored in today's medium-to-Iarge organization. 3. The chief information officer serves as a liaison to link the professional infor mation services staff with top levels of management. 4. Senior managers tend to fall into two groups: those who view IT as a cost and those who see it as an asset. 5. For either group, it is important for the cra to find ways to add value to the corporation through the use of IT. 6. Outsourcing is an increasingly popular option for managing IT. It is important to negotiate an outsourcing contract carefully and continue to manage IT with your outsourcer. 7. There are few guidelines on how much to invest in technology. This decision continues to be one of the most difficult for management to make. S. When considering proposals for investments in new technology initiatives, management should recognize that the likelihood of a return depends on the type of application; the estimated return from the investment should be weighted by this probability and the probability of conversion success to ob tain an expected value. A key message from the text is that managers need to be knowledgeable about 9. IT and involved in managing it in the organization. 10. The pervasive nature of the technology means managers at all levels in the or ganization, not just senior management, will use and make decisions about IT in the firm. 11. The role of management working with IT is to bring change to the organiza tion. Implementing change is one of a manager's most formidable challenges. IMPLICATIONS FOR MANAGEMENT
The typical reader of this book will be planning a management career rather than a career in IT. However, before you dismiss our discussions as not relevant to your career plans, you should realize that a number of CIOs actually are former users of technology rather than IT professionals. If you look at the qualifications and duties of the CIO, the reason becomes more obvious. The CEO wants a CIO who under stands the business, someone who can figure out how to apply technology to achieve the goals of the company. At some point in your career, you could end up
CHAPTER 24: I N FORMATION TECHNOLOGY ISSUES FOR MANAGEMENT
as a CIO. Patricia Barron was CIO of Xerox for a number of years. Her back ground was as a user, and she moved from CIO to president of one of Xerox's di visions. One of the things she did during her tenure as CIO was to learn as much about technology as she could, which is good advice for all of us. KEY WORDS
Anarchy Chief information officer (Cm) Expected value Federal model Feudalism Monarchy Net Present Value (NPV) Options pricing model Outsourcing Technocratic utopianism RECOMMENDED READING Brown, C.; and S. Magill. "Reconceptualizing the Context-Design Issue for the Infonna tion S ystems Function," Organization Science. 9, n o . 2 (March-April 1 99 8 ) , pp. 176-194. ( A difficult article that describes some o f the considerations i n the debate about centralizing or decentralizing IT decision making.) Davenport, T. H.; R. Eccles; and L. Prusak. "Infonnation Politics," Sloan Management Re view. 34, no. 1 (Fall 1992), pp. 53-65. (An insightful article on how different organiza tions approach IT management.) DiRomualdo, A.; and V. Gurbaxani. "Strategic Intent for IT Outsourcing, Sloan Manage ment Review. 39, no. 4 (Summer 1998). (An article that discusses three motivations for outsourcing and the appropriate relationship with an outsourcer for each.) Earl, M., and D. Feeny. "Is Your CIO Adding Value?" Sloan Management Review. Spring 1994, pp. 1 1-20. (An excellent discussion of the challenges and actions for a CIO.) Lacity, M.; and R. Hirschheim. "The Information Systems Outsourcing Bandwagon," Sloan Management Review. Fall 1993, pp. 73-86. (A somewhat contrary view of the move toward outsourcing.) Loh, L., and N. Venkatraman. "Determinants of Infonnation Technology Outsourcing: A Cross-Sectional Analysis," IMIS. 9, no. 1 (Summer 1992), pp. 7-24. (An interesting study of outsourcing.) Lucas, H. c., Jr., Information Technology: The Search for Value. New York: Oxford Uni versity Press, 1999. (A book that expands on the investment opportunities matrix and on how one makes IT investment decisions.) McNurlin, B . ; and R. Sprague. Information Systems Management in Practice, 4th ed. Upper Saddle River, NJ: Prentice-Hall, 1998. (A well-written book covering many of the topics of IT management.) Weill, P., and M. Broadbent. Leveraging the Infrastructure. Boston: Harvard Business School Press, 1998. (Results of a study of how market leaders develop and manage their technology infrastructure.)
673
674
PART SIX: ISSUES FOR SENIOR MANAGEMENT
DISCUSSION QUESTIONS 1. What do you
think a CEO wants from infonnation technology? officer? 3. Why do you think organizations have established the CIO position? What kind of individual should fill it? 4. Describe how at least one fInn gained a competitive advantage with infonnation systems. 5. How should corporate and IT planning be coordinated? 6. What is meant by the statement that a key challenge for management is the integration of infonnation technology and the business? 7. Give an example of how infonnation systems can constrain the opportunities available to management. 8. What are the motivations for outsourcing? 9. What are the "myths" of outsourcing? Do you agree with them? 10. What are the options for structuring infonnation processing in an organization? 11. How do managers react in a finn that views IT as a liability compared with a company where it is seen as an asset? 12. How should you manage an outsourcing relationship? 13. Why is a flexible contract important in outsourcing? 14. If you became the CEO of a finn, how would you evaluate its infonnation technology effort? 15. Why should a manager insist on seeing different alternatives when a new system is being designed? 16. What kind of organization might want to follow a different political model of IT than the federal model? 17. Describe how a manager provides leadership with respect to infonnation technology in the organization. 18. Discuss the problems with the different political models of IT in the organization pre sented in Table 24- 1 . 19. How should a fInn decide on proposed investments in IT? 20. What kind of changes does infonnation technology either create or facilitate within and between organizations? What other changes are associated with IT? 2. What is the role of the chief infonnation
CHAPTER 24 PROJECT
The CIO Find an organization that is willing to let you interview the top information ser vices manager in the firm. Develop a set of questions about what this individual does. In particular, ask him or her what the three most significant problems are for the top information services person in that company today. Based on the discus sion in this text, include questions about the actions of top management and users' reactions to information technology. Prepare a written report of your findings and discuss whether you think the firm you visited would be typical with respect to systems.
CHAPTER 25
I l1li
II
Ii I
Outline Social Responsibilities
Technology Applications of IT The Impact of IT Some Suggested Solutions Ethics and Information Technology The Future with Information Technology
Change Revisited
Focus on Change
The governments in developing countries know that they need to embrace the Internet if their business organizations are to be competitive. Yet many of these governments control information and avoid the openness associated with demo cratic, postindustrial societies. These governments run the risk that exposure to the free-wheeling information of the Internet will undermine their support. Can a technology like the Internet change the characteristics of highly controlling governments? A manager has to ask what impact an application that transforms the organi zation might have. What will happen to the industry and the customer? Airline computer reservation systems transformed the industry, and the Department of 675
676
PART SIX: ISSUES FOR SENIOR MANAGEMENT
Transportation issued rules regulating these systems to avoid unfair competition. Is it in the public interest to allow a totally unregulated stock market in which buyers and sellers negotiate with each other at a Web site? How does one pre vent failed transactions and fraud? What is an appropriate government and firm response to applications that change the way an industry operates? •
Information technology has an impact beyond any one organization. A user of sys tems may be affected directly as a member of an organization or indirectly as a citi zen. Systems can transcend the boundaries of an organization. In this chapter, we dis cuss some of the social responsibilities associated with information systems. We also look at the future of the technology to understand better how to prepare for it today. SOCIAL RESPONSIBI LITIES
There are a number of issues for public policy concerning information technology. In this chapter, we consider some of the most important topics for an informed manager and citizen. Table 25-1 summarizes the issues according to the following categories: • • •
Technology. Issues that relate to the nature of the technology itself Applications. Problems that arise from applying technology Impact. Issues regarding the impact of technology on individuals, the organi zation, and society
Technology
Complexity and Integrity Society in general is becoming more complex, as is information technology. As you look at the confluence of computers and commu nications technology, the increase in technological complexity is evident. What is the interaction between IT and societal complexity? Will IT make things more complicated? Will IT help us cope with the growing complexity inherent in a postindustrial, information-based economy? The answer to the last two alterna tives is probably yes. We may be able to trade off some organizational and societal complexity for information systems, but these systems in turn are likely to be complex in their own right. The movement to client-server architectures and networking create greater com plexity and dependence on machines. pes bring power to the user's desktop, but at the cost of a more complicated environment. It takes considerable effort to learn a graphical user interface like Windows 98 and to operate five or six applications packages. Using a networking environment is more complex than using a stand alone computer. All of this complexity can result in problems with the technology: Software does not run right, there is downtime on the network, users encounter problems accessing data or programs on the server, and there can be printing diffi culties. Because the environment is more complex, it can take longer to diagnose the problem and fix it compared with the days of simpler technology. The Internet is a huge, decentralized and distributed network with over 150 million users.
CHAPTER 25: SOCI ETAL IMPLICATIONS AND THE FUTURE WITH TECHNOLOGY
TABLE 25·1 SOCIAL ISSUES
Issue
Concern Technology
Complexity and integrity
Are systems so complex that we cannot understand and manage them?
Reliability and failure
What are the risks if systems are not reliable; what if critical systems fail?
Piracy
What is the impact of piracy on the economy, trade, and international relations? Applications
Securities markets
Has technology made securities markets more unstable? Has it negatively affected the small investor?
Monitoring
Should management use technology to monitor individual workers? What about workgroups?
Harassment
How can we prevent systems from harassing individuals?
Defense
Could "Cyberwar" disrupt the economy? Impact
Education
Is the U.S. educational system preparing students for the technology they will face as adults?
Technology gap
Are individuals who do not learn about technology at a significant disadvantage?
Employment
Does technology make it more difficult for the unskilled to get jobs? What is its impact on middle managers?
Privacy
Do we have a right to privacy? Does technology make it possible to violate that right?
Security
What harm can result when the security of systems is compromised? What is the risk to the U.S. infrastructure of security violations?
I nternational business
Can IT policies be used to inhibit the activities of firms trying to conduct business in foreign countries?
These problems are exacerbated by the extent to which we have become de pendent on technology. Organizations use technology to process most transac tions, to operate infrastructure systems used in transportation and communica tions, and to assure safety in air travel. The head of Synopsys, a company that sells software, spoke of this dependence. Almost all computers in a company are linked to an Intranet, the Internet, and to the public phone network for remote 10gons from anyplace in the world. At his company, if the Internet goes down, they cannot book an order, enter a purchase order, or process salaries. The software his
677
678
PART SIX: ISSUES FOR SENIOR MANAGEMENT
company develops is 100 percent dependent on the company Intranet. Web pages contain product data sheets, marketing data, and general corporate information. A program allows users to search a knowledge base looking for articles; there are 15,000 registered users inside and outside the company. Customers and company engineers download 23,000 articles a month. Many of the examples in the text demonstrate this kind of dependency on technology, a dependency that will only continue to grow. Reliability and Failure We have discussed some of the problems of control and system reliability. Information technology is extremely complex. Although systems in the future are expected to feature more redundancy and lower failure rates, there is always the possibility of a system failing. The results of such a system failure range from inconvenience to catastrophe. There is serious public concern about see ing that systems are designed and installed with adequate considerations of reliabil ity and backup. For example, critical on-board systems in airliners have long fea tured redundancy, that is, several separate and independent hydraulic systems. For the most part, the IS profession has not yet approached such levels of redun dancy. Some systems have extensive hardware redundancy, but very few systems
CHAPTER 25: SOCI ETAL I MPLICATIONS AND THE FUTURE WITH TECHNOLOGY
have software that is independently developed and executed on separate machines to provide reliability and backup. Obviously, such an approach is costly, but for cer tain kinds of systems envisioned in the future, it may become necessary. More research is needed to conduct the costlbenefit analysis necessary for se lecting the proper design for reliability. The profession in general does not have a well-developed procedure for analyzing the risks of various types of system fail ures. Without this assessment capability, it is difficult to determine the steps neces sary to achieve acceptable levels of reliability for any given system. There are also many problems related to the prevention of system failure. In 1 989, the SABRE airline reservation system failed for 1 2 hours, the longest period ever, creating problems for travel agents, airline personnel, and travelers. Piracy The technology industry in the U.S. is a strong engine for growth and jobs. Yet this industry is threatened by piracy, primarily of software. Piracy is highly organized with factories and distribution channels. It is a violation of what is often referred to as intellectual property rights. The AsialPacific region is con sidered by most companies to be the largest center of piracy. Estimates of piracy in the People's Republic of China run as high as 98 percent! The score for Russia and Latin America is estimated to be 90 percent. An attorney for Microsoft esti mated that the company is losing half its revenue worldwide to piracy. By his cal culation, pirates are stealing another whole Microsoft. Given the U.S. dominance in software, piracy is a serious threat to the economy. The violation of intellectual property rights is not confined to individuals sell ing pirated copies of software. Anytime you borrow a program a friend purchased with a licensing agreement and install it on your computer, you are probably vio lating the licensing agreement. (There are many programs that are available with out charge on the Internet and through various "shareware" bulletin boards.) Soft ware companies offer a variety of licensing arrangements. Frequently universities are licensed to use software in a computing lab at a very low fee in order to intro duce students to the programs. For the software vendor, the misappropriation of its intellectual property rights is a major problem. Applications of IT
Electronic Securities Markets On October 19 and 20, 1987, the stock market came close to what was later described as a "meltdown." There were a number of investigations of what happened during this market collapse. Two investment and trading strategies that are possible only because of computers were given a signifi cant amount of blame for the problem. One strategy, called portfolio insurance, involves the sale of futures to offset a falling stock market. In addition, the insurer sells stock while the market is falling, thus contributing to a decline in the price of stock. Arbitrageurs look for differ ences between stock index futures prices and the prices of the underlying stocks. Investigations of the October 1 987 crash suggest that this arbitrage, combined with portfolio insurance, drove the market down and was responsible for much of the volatility in the market following October 19.
679
680
PART SIX: ISSUES FOR SENIOR MANAGEMENT
These strategies require computers to perform calculations and alert the trader or to actually send trades to brokers. In addition, computerized trading systems at the New York Stock Exchange help the arbitrageur, who must simultaneously trade stocks and futures before a price change eliminates an arbitrage opportunity. The end result of investigations into the crash was a series of "circuit breakers": When different averages move by a certain amount, trading is halted for some pe riod of time to allow the market to adjust. There are concerns that technology contributed to a lack of stability in the market, and this may discourage individual investors from investing. However, even with these concerns, stock exchanges are moving to develop electronic mar kets and sometimes closing the comparable physical exchange. There are thou sands of individuals exchanging financial instruments in on-line markets through the Internet. Electronic brokers have experienced tremendous growth, accounting for 35 percent of retail stock trades. The speed and low cost of these trades have encouraged "day trading"-where investors buy and sell the same stock in a short period of time. ECNs, or electronic computer networks, offer a place to exchange shares of stock off the traditional stock exchanges. What will the impact of this technology be on the financial markets? Monitoring Computer systems offer the opportunity to monitor worker per formance closely. An insurance company can determine how long it takes a repre sentative to serve a customer on the telephone. An airline can tell how long a reservations agent takes on each call and how many calls the worker handles in each shift. On the production line, errors are traced back to the individual making them. Control systems also track individual worker productivity. Many individuals respond negatively to such monitoring. For example, one em ployee sued her employer for monitoring her e-mail messages. It is possible em ployees will refuse to work with or that they will try to sabotage systems that closely monitor their work performance. One solution, adopted by an automobile manufacturer, was to form workers into teams; the firm publicizes the perfor mance of the entire team rather than that of individual workers. Team members discuss the team's performance and try to figure out how to do better. Coupled with a team bonus system, this approach to monitoring lets management keep track of production without the severe negative effect on individuals who resent having their performance measured by a computer system. Harassment Too many times, it appears we are harassed by computers. Systems are designed to automatically send second, third, and even further overdue notices when a customer has a legitimate complaint about a bill. Computers connected to automatic dialing machines harass consumers via the phone. Systems appear unre sponsive to an individual's problems because of the need to process large volumes of information quickly. Some systems may be flexible but require cumbersome manual procedures to update records and keep them accurate. If a clerk makes an error or omission, the computer will continue sending letters to the customer. In other situations, employees learn to rely on systems and do not provide customer
CHAPTER 25: SOCI ETAL IMPLICATIONS AND THE FUTURE WITH TECHNOLOGY
service when a system is unavailable. One bank installed an on-line inquiry system for tellers cashing checks. For backup, the tellers were provided with the same hard-copy microfilm used before installation of the on-line system. However, when the new computer system became unavailable because of a malfunction, many tellers refused to cash checks and told customers to come back when the computer was working. Defense Since so much of the economy of developed countries depends on tech nology, these nations are vulnerable to electronic warfare. In a recent popular novel, a war with the United States begins when the aggressor country's banks make massive sales of Treasury bills through electronic markets, driving down the value of the dollar and affecting the U.S. stock market. A recent issue of Time had a cover story on "Cyberwar" in which the magazine interviewed officers at the Army Intelligence and Security Command who plan electronic offenses against enemies and defenses for the U.S. As an example, a country might try to insert a computer virus in an enemy's tele phone switching stations to cause a nationwide failure of communications. If you in sert logic "bombs" in enemy communications networks, you can set them off to dis rupt rail and air transportation as well. Other scenarios describe various kinds of electronic mischief to disable an IT-intensive economy without firing a shot. The Impact of IT
Educating for Technology is an ongoing challenge:
The education of individuals for the following roles
• Knowledge workers. Probably the largest group we consider will be those who use technology-individuals in firms whose primary responsibilities are not in the IS field. These employees need to be able to use computers as a part of their work. The typical professional has some type of managerial workstation, a pow erful PC connected to a network. The knowledge worker needs to understand something about computers, networks, and different kinds of software. He or she should be familiar with using the Internet for commerce and to search for in formation. At the next level, the user needs to understand how to use this tech nology to improve his or her performance. • IS professionals. These individuals will work with the technology. The category includes programmers, systems analysts, managers, and other staff members. Systems professionals must have an in-depth understanding of the technology and its applications. Some of these employees will develop hardware and soft ware packages, and others will apply combinations of hardware, packages, and custom programs to the problems faced by organizations. • Interface personnel. Between the IS professional and the user is an interface staff. These individuals have functional knowledge of how computers and soft ware work but do not have a command of all the technical details. They need to be conversant with the kinds of problems faced by organizations and understand business and management.
681
682
PART SIX: ISSUES FOR SENIOR MANAGEMENT
Healthnet is a global network for sharing medical knowledge. A few years ago a Swiss doctor posted a message on the network telling Of the death of a yellow fever patient. Officials at the Pan American Health Organi zation noticed the message and followed up; they found the patient had recently traveled through Manaus, Brazil, a city with a large mosquito population. The agency contacted B razilian health authorities who moved quickly to immunize the entire city to prevent an epidemic that could have killed thousands. There are many similar stories. A Tan zanian physician retrieved enough informa tion on burn treatment to save a child who had fallen into a cooking fire. A New Delhi doctor posted a request for help in dealing with a possible epidemic of dengue. Within 24 hours a World Health Organization team arrived to train. hospital staff.
The network has high-speed lines, satel lites, e-mail , on-line forums, and I nternet connections, all run by a nonprofit corpora tion called SatelLife. One of the advantages of the network is that civilians control it; there is no government influence. Some governments are embarrassed by the condi tions leading to disease and epidemics; they would rather deny the problem than adver tise it and seek help. Healthnet is free of government control. In addition to helping physicians, the founders of the network hope it can play a role in education, especially in developing countries. Consider a forum de voted to the increasing incidence of cardio vascular disease in developing countries. This forum could be the first step in provid ing health care workers in remote areas with programs to educate patients about the risks of tobacco and lack of exercise.
The SatelLife web site.
SatelLife's Mission Siltl!l1Life itan intamtttiooa1oo�'1l'Wfit �n �$atel1ite. � and ra.di¢ � � ro setVetiwhealth!:ommunicatiMlnd��m:cf �$ ltt � � wQt'kttbrwgb. aglQhiil coropuWt�bill$ed�
netw«k.� Satel'Lite'Il .mmionis to imprwe: cl1lctronic C«Ufi'lUatiOBS and � ofinf� in the Stkls ofpublic health,. me4kme and the envir«untnt A special emplmi$ is plated Ott llIUaf -oftbt wMdwhere access is limited by p<>0l' c�atiom-, ecooOO'li.c c�ot diwte:r" Tht�futSatettitt c:ame.ftmnDr, Bemardl.¢wn. PMr » Ihe aMlion of Sate1Ut'e. Dr. L<>wn C{)«fuuMed. 1:he or,ganinti
li':rmOOm:!.sfNw;:ki¥;Wilt, which in 1985 was awarded. the NobetPeace Pritt. �C
fntaU �,\x¢Mtbe� Q{'Iite-#avUlg infoonati<mam<>ng hea1lhprQfeulm:lal$ in b>oth developed naIiOIlS and the
CHAPTER 25: SOCIETAL IMPLICATIONS AND THE FUTURE WITH TECHNOLOGY
Today's automobile design is often a large distributed effort involving thousands of engi neers and technicians around the world. In formation technology is helping to coordinate this process and eliminate paper. A typical car consists of from 1 0,000 to 1 5,000 indi vidual parts from up to 200 suppliers. The 1 998 Chrysler Concord and Dodge I ntrepid are the largest successes to date of paper less design. Chrysler's digital design effort is based on a program called Catia (computer-aided, three-dimensional i nteractive applications) from Dassault Systemes of France. This system packages the entire vehicle digitally, including engine, suspension, mechanical components, and interior. It provides aero dynamics calculations, impact simulations, fluid dynamics calculations, heat transfer calculations, and the design of the electrical system. To check out di gital representa tions, users "print" the design in three di mensions using fabricators, for example, an ink-jet-like process in which tiny droplets of plastic are deposited on one another to build up an object.
Virtual reality is one of the latest addi tions to the design process. The user can explore relationships and movements of objects in three-dimensional space. An en gineer at Chrysler wearing a headset con nected to a virtual reality system running on a supercomputer, and holding a real steering wheel, sees the inside of the auto mobile and the road from the driver's per spective. Virtual reality is a natural exten sion to the "digital vehicle" design process; it helps to visualize the desig n , check to see that controls are ergonomically accept able, study color combinations, and see how difficult it is to remove and insert parts during service. On the assembly line, virtual reality is creating a new discipline called computer aided production engineering (CAPE). An engineer uses VR technology to design a manufacturing process, checking the feasi bility of assembly steps in three-dimensions by examining sequences and movements. Engineers can explore various ways of pack aging parts into assemblies and explore in sertion and extraction paths for parts.
• Factory and office workers using computer equipment. Factory jobs that used to require minimal education now require skilled workers. One factory has under gone dramatic changes over a l O-year period; A decade ago, the plant could op erate with a largely unskilled and uneducated work force. Today parts of the plant have been replaced by a "clean room" for production. Parts bins are tracked using computers and bar codes. In one room, a machine operator uses a touch screen on a computer-driven testing device to enter testing parameters.
Some of the best and highest paying factory jobs today are at semiconductor plants. At one of Intel's newest plants making Pentium processors, the minimum educational qualification for a job is an associate's degree from a two-year college. A factory worker with this background needs a far different educational experi ence than the steelworker or autoworker of 20 years ago. Are primary and secondary schools preparing students for these types of jobs? Where will skilled employees come from in the future for clerical and factory jobs? Will business itself have to educate its workers? In a number of cities, companies
683
684
PART SIX: ISSUES FOR SENIOR MANAGEMENT
are "adopting" local schools, especially in the inner city, in order to improve the quality of education. Businesses provide funding for special programs and encour age their employees to volunteer in the schools. While not the sole answer, there have been a few experiments in which schools provide personal computers at home for disadvantaged students. Teachers, parents, and students communicate about schoolwork, and the results look very promising in terms of motivation and reducing dropout rates. A special tax on long distance calls is being used to finance an effort to connect all schools in the U.S. to the In ternet. A massive investment would be required to provide these kinds of techno logical resources for every student in the U.S. or any other country. The Technology Gap There is a serious concern over whether computer and communications technology will accentuate the gulf that exists between the "haves" and the "have nots," among both individuals and nations. Will those who are able to acquire computer systems or knowledge of how to use them become the new elite? Will individuals who are not computer literate find themselves rele gated to a second-class existence? It is unlikely that such extremes will evolve, but it is likely that significant segments of the population will become less able to deal with an economy that depends on information technology. More than half of U.S. homes do not have a personal computer; to the extent that there are children in these homes, will they be disadvantaged compared to those who have easy access to computers? Fewer households have an Internet connection than have computers; will access to the Web at home and school be required to obtain an adequate education in the future? Outside of the U.S., the situation is even more
A variety of appliances may soon show up in stores with the capability for connection to the Web. Manufacturers are exploring ways to integrate http software into their products; the idea is to allow for remote monitoring and control. You might see Web technology in appliances such as VCRs, vending ma chines, door locks, or you r toaster. With compact server software, it is now cheap for a vendor to integrate a Web server into just about any product. Xerox plans to embed a server in its copiers to allow status and job monitoring. Another company is working on Web-enabled door locks. The advantage of these devices is that one can control them from a central location. If the gas company incorporated web tech-
nology in gas meters, the meters could use push technology to send usage information to the company, eliminating the need for meter readers. You could command your Web-enabled microwave to start cooking dinner from your office before leaving for home. With Web-enabled door locks, you could unlock your house from the office at the time children are due home from school. Business Week estimates that over 20 per cent of the devices on the Internet within a few years will not be PCs. While you can question whether con sumers will pay for some of the gadgets under development, there is no question that appliances on the Web will make the I nternet an even more pervasive part of modern life.
CHAPTER 25: SOCI ETAL I MPLICATIONS AND THE FUTURE WITH TECHNOLOGY
bleak. There are countries in the Middle East and Africa that have no Web servers; they are cut off from access to the Internet and Web. Will a global economy that de pends heavily on information continue to leave these countries behind? It is possible that developing a technological infrastructure is as important as building roads and other physical infrastructure in underdeveloped countries. Employment Labor leaders are extremely concerned about the possibility of wide-scale unemployment because of information technology. The computer and communications industries are two of the largest in the United States, and have created hundreds of thousands of jobs. Naturally, the implementation of some in formation systems eliminated or modified jobs, though few statistics indicate the overall impact on employment. It does appear that the continued introduction of automation will reduce em ployment in manufacturing. The extent to which this effect will be offset by the creation of jobs assembling and servicing new manufacturing equipment is un known. However, increased technology will certainly require a more highly skilled, better-educated workforce. The implementation of information systems also has implications for the pace of technological evolution, employment security, and the importance of retraining workers when jobs change. Have computers enhanced or reduced individual! initia tive and workers' interest in their jobs? Finally, there is speculation that firms' investments in technology are finally af fecting middle management. With electronic communications, GDSSs, and group ware, individuals can communicate easily. There is no longer a need for a layer of middle management as a conduit for information between the next-lower and next higher level in the organization. Many middle managers who lost jobs in the: reces sion of the early 1990s were unable to find other work. There is no hard evidence that IT is reducing these middle-management jobs, but many labor experts and economists suggest it is contributing to the reduction of middle-manager ranks. The T-Form organization uses IT design variables to create a flat structure with minimum overhead; requiring fewer employees than a traditional organization. The remaining employees will use IT as an integral part of their jobs. Privacy Certainly, one of the most widely debated topics relating technology to society is the issue of an individual's right to privacy. The U.S. and Europe have quite different views of privacy. The European Union has a law that prohibits the purchase and sale of personal data, something quite common in the U.S. The law basically makes it illegal to use information about a customer in ways the customer never intended, which means that a firm cannot sell data to another comp:my for marketing purposes. A key provision of the law is that any company doing business in the European Union is prohibited from transmitting personal data to a country that does not guarantee comparable privacy protection-namely, the U.S. The United States has a much more relaxed policy, relying primarily on industry self regulation. One fear is that this kind of legislation could have a chilling effect on electronic commerce.
685
686
PART SIX: ISSUES FOR SENIOR MANAGEMENT
At what point does the right to privacy conflict with other rights? Society cer tainly has the need and the right to have certain kinds of information that con tributes to the general welfare. Demographic information and information on in come levels are vitally important in establishing national policy. Information on wages and financial conditions, however, is considered to be extremely sensitive by most individuals. Current thinking is that individuals should have the right to ascertain whether information held about them is correct and to enforce the correction of errors. There is less agreement on the penalties imposed for misuse of private information maintained in some type of data bank. Other questions arise as to whether individ uals should have the right to know who requested information about them from a data bank. Some countries are very concerned about this trend. For example, Swe den enacted a comprehensive program to regulate the development of data banks. Some legislators in the U.S. are concerned about the practice of state govern ments selling data. A number of states sell access to automobile registration data. Direct-mail marketing organizations use auto registration information to target mailings. In other instances, individuals have obtained the license plate numbers of a group attending a meeting and use that information to harass the attendees. The Web introduces another privacy concern: companies collecting information about people who visit their Web site without the visitor's knowledge. The FTC conducted a recent survey; a group of agency lawyers surfed the Web for two weeks, visiting some 1400 sites. Of these, more than 90 percent collected personal information from visitors, but only 14 percent of them disclosed how the informa tion would be used. The FTC concluded that some form of formal regulation is needed and that self-regulation of the Internet had largely failed. A number of solutions have been proposed; the federal government passed leg islation affecting only federal agencies. There have been suggestions to extend the federal law to the private sector. As it stands now, the legislation requires a large amount of record keeping about the pattern of access to records containing any personal information. There are fears that the proposals for the private sector may prove extremely costly for organizations. One important issue, then, is what the balance should be between the individual's rights and the burdens and costs of protection and record keeping. Security Closely related to problems of privacy is the issue of system security. There are many possible threats to the security and integrity of computer systems, particularly those with open access by individuals external to the organization. There have been a number of well-publicized penetrations of various computer systems, including a major cancer research hospital's on-line system. Researchers in the field are working on methods of encrypting data so they cannot be inter cepted and decoded by an unfriendly user. Such concerns are very important, given the existence of highly sensitive data in on-line databases and the need for a secure payments system for electronic commerce. There are a number of approaches to safeguarding credit card numbers sent to merchants over the Internet, generally involving some type of encryption.
CHAPTER 25: SOCIETAL IMPLICATIONS AND THE FUTURE WITH TECHNOLOGY
Alternatives to a credit card like "digital cash" and electronic script are avail able. The President has a Commission on Critical Infrastructure Protection out of recognition that our quality of life is highly dependent on our physical and electronic infrastructure. This Commission has addressed potential vulnerabili ties in water supplies, emergency services, government operations, energy, banking and finance, information and communications including telecommuni cations and the Internet, and physical distribution. Growth of International Business One of the major changes in the global econ omy in the past decade is the growth of international business. The United States, Canada, and Mexico are reducing and eliminating most tariffs. Europe has created one market and currency to facilitate trade. Major corporations view themselves as worldwide global firms that happen to have a headquarters in a particular country. What are the implications of internationalization for information technology? One major problem for the multinational is restrictions on the flow of data across borders. A related problem is the need for standardization, which may be antithetical to a management climate that stresses local control and initiative. Why might we need standards for information technology? Most headquarters opera tions collect financial data from various subsidiaries. If there are no standards for reporting, the task at headquarters will be much more difficult. Standards also make it easy to share applications among a firm's locations. During the latter part of the 1 990s Asia and Latin America have had major cur rency problems, partially because funds are moved quickly around the globe elec tronically. Political leaders in the U.S. have tried to make the point that business and commerce have truly become global and that we are all interconnected. Many people, especially politicians, fail to realize the extent of international trade and the degree to which the world's financial systems are linked through computer net works. The Internet, Intranets, and the proprietary networks of global companies cover the world, as do networks for banking and securities trading. From a com munications standpoint, people all over the world become instantly aware of events in distant locations. Some Suggested Solutions
Education The excitement over the Internet highlights the different opportuni ties available to students from homes with PCs compared to homes without them. A $500 netsurfing computer that doubles as a TV set might help reduce this dis parity. Connecting every school in the U.S. to the Internet is an excellent goal, but much more is needed. Schools and students need personal computers, and we must help teachers integrate into their curriculum the tools provided by technol ogy. There have been suggestions that technology will change the nature of educa tion. Teachers will spend less time in front of a class and more time working with individual students who are using the Web to conduct original research. Is this a good model for teaching? Is it appropriate across students and subjects? It is suggested by some that multimedia will revolutionize education. For this revolution to take place, schools will need to redesign and develop new curricula
687
688
PART SIX: ISSUES FOR SENIOR MANAGEMENT
in which the capabilities of technology are exploited to provide new ways of learn ing. And of course the necessary funding for this will have to be found. If this rev olution occurs, children will learn to work with the technology as a part of their entire educational experience. Some companies are using computers to help illiterate workers function on the job. In one warehouse, forklift drivers who cannot read get instructions from the "talking computers" they wear on their belts. At a Raytheon plant, inspectors look ing at circuit boards through microscopes dictate reports into a voice-recognition computer instead of writing the report. This system makes it possible to employ workers whose native language is not English. Building an International Infrastructure The Internet is increasingly impor tant for education and business, yet there is little access to the Net in less devel oped countries and the Middle East, except for Israel. There are very few Web hosts in Africa outside of South Africa. The U.S. has begun to train Peace Corps volunteers in the use of the Internet (you might think volunteers just out of col lege would know a lot about the Net already). Peace Corps volunteers will be encouraged to use the Internet to modernize remote areas. The announcement of this program did not indicate how a volunteer in a remote village in Africa could arrange for Internet access, but maybe that will come in a future program. The Agency for International Development is trying to help Africa "go online." AID will extend this program to eight other countries, including Haiti, Egypt, Mo rocco, and Paraguay. Certainly one approach to help development in these and sim ilar countries is to build a communications infrastructure and encourage the devel opment of the Internet. However, there are many problems that must be solved for programs to be successful. In some countries, for political or religious reasons, gov ernment leaders do not want the population to have greater access to the uncen sored, uncontrolled information on the Internet. Once they've gotten beyond this problem, teachers and managers have to learn how to incorporate the Internet into their activities. Many of these countries have a low level of literacy, or at least of technological literacy, which makes effective use of the infrastructure a challenge. One solution might be to create an international agency whose sole purpose is to expand the Internet and Web. This agency would be staffed with experts on both networking and implementation. The network staff would help develop a network infrastructure, and the implementation staff would educate potential users of the Net. An objective in each country would be to build an indigenous industry capa ble of developing applications for the Web. Through a concerted, multinational ef fort, the Internet could become a powerful tool to help underdeveloped countries improve education and commerce. Technical Safeguards Some problems involving misuse of information systems are technical in nature. We should attempt to make systems as secure as possible to avoid penetration by hackers. Thorough testing is needed to prevent programs from inadvertently disclosing sensitive data. There should be technical checks on procedures to prevent accidental entry by unauthorized individuals.
CHAPTER 25: SOCIETAL IMPLICATIONS AND THE FUTURE WITH TECHNOLOGY
A more difficult challenge is to design a system that is secure from skilled agents or individuals attempting to commit fraud through the system. Protecting a system from malicious programs such as viruses is also not easy. Protection may take the form of monitoring to keep track of users or introducing special encoding algorithms to maintain security. Controls Some of the controls discussed in the previous chapter can help pre vent certain problems from occurring. Requiring several individuals to authorize changes in programming and databases, and checking input carefully help main tain data integrity. Controls requiring all data to be processed help solve such problems as data not updated to reflect payments. Controls are important to the ex tent they ensure accurate processing and screen out requests in which access is aimed at fraud or mischief. Legislation Another solution to some of these social issues, particularly privacy and abuse of power, is legislation. In 1973, Sweden enacted a law regulating how and where personal data are maintained about individuals. The act established a data inspection board that grants permission to keep a data bank of personal infor mation. Sensitive data, such as records of criminal convictions, can be maintained
The modern detective relies on electronic dossiers to find information about people under investigation. Web sites with names like Dig Dirt and SpyForU sell unlisted num bers, bank account numbers, and salary in formation. Governments eager for funds sell digitized public records to commercial data base companies. The state of Illinois makes $ 1 0 million a year from the sale of public records while Rhode Island sells its motor vehicles data alone for $9.7 million. Other available records range from real estate data that list the number of bedrooms and last sale price of houses to divorces and bank ruptcies. While much of this i nformation used to be available in courthouse records, now you can easily access it from anyplace in the country using your computer. One company collects and massages data to produce a product for sale to inves tigators, i nsurance agents, bill collectors, and journalists. A user types in a name and
receives back the person's social security number, date of birth, and telephone num ber for a cost of $ 1 .50. For a few dollars more, the user obtains other personal de tails such as past and current addresses; names and phone numbers of neighbors; names and social security numbers of rela tives; in-laws, and business associates; civil judgments, and property tax data. While these services and web sites are probably legal, investigators often hire law enforce ment officers to access confidential data stored on government computers. Companies involved in conflicts and liti gation are interested in obtaining information on their adversaries. Is there a right to pri vacy? Should there be legislation to prevent the collection and sale of personal informa tion? With so much personal data available in different electronic dossiers, is it too late to prevent the collection and sale of personal data?
689
690
PART SIX: ISSUES FOR SENIOR MANAGEMENT
only by an agency charged by statute with the job of keeping these records. Once permission is granted, the data inspection board issues regulations to prevent undue encroachment on privacy. Responsibility for maintaining the correct data lies with the organization maintaining the data bank, not with the individual whose records are in the bank. Organizations whose key records are in error must make corrections demanded by the individual. Damages are specified for violations of these regulations. The recent European Union law described earlier in this chapter also offers strong privacy protection, potentially in conflict with business practices in the United States. In 1974, a comprehensive Federal Privacy Act was passed in the U.S., requiring government agencies to keep elaborate records of the use of personal information. Records of inquiries by those whose records are kept must also be provided. To extend these requirements or a similar set to private-sector firms, some of the fol lowing topics are usually proposed in privacy legislation: • Notifying the subject about the existence of a record • Responding to inquiries on the contents of data and the use of records • Investigating complaints • Obtaining consent for each use of the data • Checking authorization for requests • Keeping a log of all accesses • Providing subjects' statements when disputed data are released • Sending corrections and/or subjects' statements to past recipients of information • Ensuring accurate compilation of records • Providing additional data to give a fair picture • Providing a secure system
Although many of these requirements would prevent abuses of data, the regula tions are potentially expensive to implement. System Design Some of the preceding solutions will be implemented and will help solve some of the societal problems with information systems, but are they really sufficient? To a large extent, many social implications are determined dur ing the system design process. By asking appropriate questions during the design process, we can assess some of the potential problems regarding the impact of the system on society. For example, we can ask the following questions about each application:
Is the application a potential threat to anyone's rights? What could go wrong? For example, do the files contain rumors, hearsay information, or unevaluated reports on individuals? • Is there a built-in incentive against using the system? For example, does it police workers who contribute the data? • Is it difficult for someone to use the system? That is, could an unauthorized indi vidual fill out the forms, understand the input, enter data through a terminal, or do whatever is required? •
CHAPTER 25: SOCIETAL IMPLICATIONS AND THE FUTURE WITH TECHNOLOGY
• How many ways could someone find to defraud or penetrate the system? • If someone wanted to misuse the data in the system, how could he or she evade the procedures that safeguard them? What could someone do to misuse the data? • Is the system sufficiently reliable?
The design team should encourage independent attempts to penetrate the system along these lines to verify the completeness and viability of the design. A well designed system is the best guarantee against harassment, abuse, privacy viola tions, and alienation. ETHICS AND INFORMATION TECHNOLOGY
There is a professional code of conduct for computer professionals developed by the Association for Computing Machinery, a society of individuals who teach and work in the field. This code applies only peripherally to users and managers who may work with technology but who do not consider themselves professionals. Does IT create any new ethical dilemmas for management? The discussion of social problems at the beginning of this chapter raises some ethical issues associated with IT and management. Ethical considerations include concerns that: •
• • •
• • •
Data in the organization should be used for its intended purpose and the in tended purpose should be legitimate. Monitoring of workers should be undertaken with their consent, and the data should be used to help rather than punish the workers involved. Systems and services made available to individuals external to the firm should behave as specified and cause no harm to others. Systems within the firm should not be guilty of harassment. Appropriate privacy should be maintained; for example, e-mail files should not be read by individuals not involved in the exchange of messages. Appropriate software copyrights should be observed and there should be respect for intellectual property. Systems should be secure and well controlled.
Ethical decisions arise frequently when dealing with information technology. Mason ( 1 995) suggests how we can identify and approach a situation where ethi cal considerations arise. The crucial point occurs when a moral agent-one that by definition has choices decides to change the state of information or information technology in a human sys tem. Changes in hardware, software, information content, information flow, knowledge based jobs, and the rules and regulations affecting information are among the many things that agents do that affect others . . . [W]e must use our moral imagination to guide our choices so that we can contribute positively toward making the kind of ethical world in which we want to live and want to bequeath to our future generations. How can we do this? . . [F]undamental is our conscience, aided by our understanding and expertise in information technology. If we have an inkling our behavior . . . might in
691
692
PART SIX: ISSUES FOR SENIOR MANAGEMENT
some way harm others, we probably should examine our decisions a little more care fully and from an ethical point-of-view. The facts of an ethical situation can be summarized by four factors. The first factor is to clearly identify the moral agent. Whose actions will bring about the technology-in duced change? The next factor is the set of alternative courses-of-action available to the agent. These are the real world acts that will have an effect on the human system under consideration. Acts have consequences, hence the third factor: . . . delineation of the results that are expected to occur if each act is taken. Finally, it is essential to identify the stakeholders who will be affected by the consequences of the acts . . . stakeholders have an interest in what the agent does.
It is easy to choose ethical behavior in a classroom setting when discussing a case study. It is much more difficult when working in an organization and facing budgetary constraints and pressure from peers, customers, top management, and stockholders. Kallman and Grillo ( 1 993) suggest several informal guidelines for ethical behavior: •
•
The family test. Would you be comfortable telling your closest family mem bers about your decision or action? The investigative reporter test. How would your actions look if reported in a newspaper or on a television news program?
C HAPTER 25: SOCI ETAL IMPLICATIONS AND THE FUTURE WITH TECHNOLOGY
•
•
The feeling test. How does the decision feel to you? If you are uneasy about a decision or action but cannot understand why, your intuition is telling you it is not the right thing to do. The empathy test. How does this decision look if you put yourself in someone else's position? How would it look to another party affected by your actions?
Significant lapses in business ethics in the U.S. and around the world create a new awareness of the need for ethical behavior in highly interdependent societies and economies. The ethical issues surrounding technology are probably easier than most, and we hope your knowledge will help you make the right decisions. You can find a significant amount of material on ethics at http://is.lse.ac.ukiiswnet/ profact/ethics.htm. THE FUTURE WITH INFORMATION TECHNOLOGY
The last half of the twentieth century has seen a revolution in information technology. Looking at the first mainframe computers, no one seriously considered the possibility of having a machine that was more powerful sitting on their desk or in their briefcase. It has taken many years for information technology to make such vast changes in or ganizations and society. However, the pace of change has increased dramatically with innovations like the Internet. What can we say about the future of technology? How will new applications of information technology change the way we work and live? The most recent and fastest growing innovation is the Internet and the World Wide Web. New models for business generally involve the Web and include ideas like electronic commerce, streamlined supply chains, electronic markets and even web-enabled appliances. The Internet provides, for the first time, a worldwide net work infrastructure. Over 100 million people around the world can access applica tions and information placed on the Web. This same technology allows knowledge workers to access vast amounts of cor porate information online using an Intranet. All kinds of information access is pos sible through a single program, your Web browser. No longer is it necessary to create or use a custom interface for each application. By allowing customers and suppliers to access data on an Intranet and thus creating an Extranet, organizations change their business models. The combination of computers, databases, and telecommunications, especially the Internet, provide the manager with an incredible number of options for im proving the way an organization functions. Your challenge will be to choose ap propriate technology, implement it successfully and continually manage change. Change Revisited
In Chapter 1 we asked the question, in what way can and does technology change the world around us? Information technology has demonstrated an ability to change the following: •
Within organizations Create new procedures, workflows, workgroups, the knowledge base, products and services, communications
693
694
PART SIX: ISSUES FOR SENIOR MANAGEMENT
II It may be a relief to turn off the computer in your office, get in the car, and head home. The trouble is that there is likely to be more computer power in your car than on you r desk. The Volvo S80 sedan has a n unusual accelerator, one that is likely to become standard equipment. In most cars, when you press down the accelerator, there is a direct connection to the engine and the car re sponds. In the Volvo, pressing on the accel erator sends a digital signal to an engine management computer to open the throttle on the e n g i n e . Volvo c l a i m s t h i s new process results in smoother operation and lower fuel consumption and emissions. The electrical system of the car is a com munications network of 1 8 computers with central control units and 24 modules for elec trical functions. The engine compartment net work transfers data at 250 Kbits/second and the passenger sector of the network trans fers at a rate of 1 25 Kbits/second. A central electronic module joins the two subnets. The car contains some 4000 feet of wiring! The electronics modules are: •
•
•
•
•
•
•
•
Upper electronic module-controls mirrors and map lights Electronic throttle module-controls engine power Transmission module-senses driving style and changes gear settings in the transmission Engine-has controls for fuel injection to increase or decrease torque in response to commands from other computers in the vehicle Antilock brakes-controls brakes, traction control, and dynamic stability to reduce skids Steering wheel module-controls radio and climate control functions located on the wheel Central electronic module-master computer that also coordinates diagnostic functions Restraint system-controls the safety system, which includes driver and
•
•
•
•
•
• •
•
•
passenger airbags, side impact air bags, two inflatable curtains, and seat belt tensioners Climate control-maintains interior temperature Audio module-controls the sound system Driver door module-controls driver power locks and windows Driver information module-controls the instrument panel Sun roof module-opens and closes the sun roof Phone module-controls cellular phone Passenger door module-controls passenger door locks and windows Rear electronic module-controls functions such as rear window defroster Power seat module-controls seat functions, adjustments, heating
Many of these modules enhance comfort, b u t several are i m p o rtant a d d i t i o n s to safety. A good example is a stability control system. This system receives data every 40 milliseconds from a series of sensors, including one for the position of the steer ing wheel, wheel speed, sideways acceler ati o n , and t h e rotat i o n of t h e v e h i c l e around a vertical axis (yaw). A computer compares the car's dynamiC performance with a model in memory and the driver's in tentions. If the computer detects a likely out-of-control event, e.g., the car is under steering or oversteering, it orders the en gine computer to reduce power or applies the brakes on one or two wheels to keep the car going in the direction the driver has pointed it. The system can do t h i n gs a driver cannot, such as applying the brakes on only one wheel. All these computers add complexity, but they include enhanced diagnostics as well. The diagnostic system will keep track of fail ures, so that even an intermittent problem is stored in memory. A good technician should be able to find the specific problem your car had at 6 P.M. last Tuesday.
CHAPTER 25: SOCIETAL IMPLICATIONS AND THE FUTURE WITH TECHNOLOGY
• Organization structure Facilitate new reporting relationships, increased spans of control, local decision rights, supervision, divisionalization, geographic scope, and "virtual" organizations
• Interorganizational relations Create new customer-supplier relations, partnerships, and alliances
• The economy Alter the nature of markets through electronic commerce, disintermediation, new forms of marketing and advertising, partnerships and alliances, the cost of transactions, and modes of governance in customer-supplier relationships
• Education Enhance "on campus" education through videoconferencing, e-mail, electronic meet ings, groupware, electronic guest lectures Facilitate distance learning through e-mail, groupware, and videoconferencing Provide access to vast amounts of reference material; facilitate collaborative projects in dependent of time zones and distance
• National development Provide small companies with international presence, facilitate commerce Make large amounts of information available, perhaps to the concern of certain govemments Present opportunities to improve education
The study of information technology is the study of change. Throughout the text we have seen examples of these changes. As a manager, you will have the opportu nity to take advantage of what technology offers. The Internet provides you with a worldwide infrastructure that can deliver information and applications to almost every place in the world that has a functioning economy. The smallest organization can think and sell globally. You can create a virtual organization using technology to coordinate and communicate the actions of your partners. Information technol ogy provides incredible opportunities to change the world, from the nature of work to the nature of national governments. And let it be noted that there is no more delicate matter to take in hand, no more danger ous to conduct, nor more doubtful in its success, than to set up as a leader in the intro duction of changes. -The Prince, by Niccolo Machiavelli, early 1500s.
CHAPTER SUMMARY 1. There is no question that information technology is becoming more complex,
especially the combination of computer and communications technologies. 2. Society and its institutions are becoming more dependent on technology every day. The reliability of IT is a constant concern.
695
696
PART SIX: ISSUES FOR SENIOR MANAGEMENT
The first suggestions to allow voting over the Internet were met with a singular lack of en thusiasm. Now, however, the Pentagon is sponsoring a test for the 2000 general elec tion in which 6 million Americans overseas, both military and civilian, will be able to vote over the Internet. These individuals will join five states, Florida, Missouri, South Carolina, Texas, and Utah, that are participating in this experiment. An auditor in the Florida Divi sion of Elections, on first hearing the idea, responded "That's a stupid thing to do." After investigating approaches to on-line security, he became a leading proponent of Internet voting. After all, electronic voting machines cost from $5000 to $7000 each. T h e re are two major technical safe guards needed. The first is a digital signa ture to be sure that you vote once, unlike the practice often attributed to a very strong Chicago mayor that you should "vote early and vote often." Second, it is extremely im portant that the way a person votes is not
known to anyone; thus the digital signature has to be verified and discarded, without anyone being able to match the signature and vote at any point in processing. I nternet technology could facilitate voter registration with even fewer technical prob lems than voting. In this case, you simply want to verify that the person registering ex ists and lives at the address specified. How ever, voter registration is a highly political issue. A larger voter turnout generally favors one political party, so not all politicians are eager to see voter registration made easier. Registration and voting via the I nternet offer one way to help i ncrease the voter turnout at elections. The U.S. is one of the most democratic countries in the world, and that democracy is threatened by low voter turnouts. I nternet voting would solve prob lems caused by waiting lines at the polls and by bad weather. A large number of people could vote from their place of work, and a significant number could vote from home.
3. Software piracy is a threat to many companies, depriving them of revenue they need to continue to refine their products and remain in business. 4. Key applications of technology include the securities market, banking, and transportation. 5. Technology can be used to monitor workers, something most employees find unattractive. 6. There have been instances where systems appear to harass. 7. The U.S. is increasingly concerned about electronic warfare in which an op ponent tries to sabotage crucial computers and communications networks. 8. The successful use of IT requires an educated population, yet there are ques tions about the quality of education throughout the world. 9. A dangerous technology gap may be developing between those who can af ford and learn about IT and those who have no exposure to it. 10. Using IT to transform organizations is likely to lead to unemployment unless greater efficiency from technology is able to expand the economy to absorb displaced workers. 11. Technology, especially databases, can compromise privacy; there are various protection mechanisms suggested for individual privacy.
CHAPTER 25: SOCIETAL IMPLICATIONS AND THE FUTURE WITH TECHNOLOGY
12. System security is a major concern, especially as computers become more in terconnected through networks. 13. IT is an important facilitator of international business, yet countries some times raise barriers to the free use of technology within their borders. 14. It is important to consider the ethical implications of designing a system. 15. Information technology facilitates change, and change is a manager's greatest challenge. IMPLICATIONS FOR MANAGEMENT
The picture that emerges from our discussions throughout the text about the future of information technology suggests that IT, the organization, and the economy are inextricably intertwined. Organizations have depended on technology for many years to process basic transactions. Today the technology is responsible for new organizational structures. Communications and workgroup technology create vir tual organizations and electronic communities. Members of the organization are connected through networks that extend worldwide, allowing people to communi cate easily, form unofficial virtual departments and subunits, and coordinate their activities. A modern organization is connected electronically to customers and suppliers. Physical proximity no longer needs to be a constraint in defining work groups and collegial relationships. The challenge for you and for all managers is to understand the tremendous po tential of information technology to change and improve the way organizations function. A powerful technology exists. The ability to effectively manage IT is the key to maximizing its value to organizations. KEY WORDS
Control Cyberwar Encryption Fraud Intellectual property Internet Misuse of information Monitoring Privacy Virtual reality RECOMMENDED READING Banerjee, D.; Cronan, T.; and T. Jones. "Modeling IT ethics: A Study in Situational Ethics," MIS Quarterly. 22, no. 1 , March 1998, pp. 3 1-60. (This article offers valuable infonnation regarding the misuse of computers that has caused huge negative effects on business and society.)
697
698
PART SIX: ISSUES FOR SENIOR MANAGEMENT
Communications of the ACM. 38, no. 12 (December 1995). (An issue devoted to questions of ethics in information technology.) Deborah, J. "Ethics Online: Shaping Social Behavior Online Takes More Than New Laws and Modified Edicts," Communications of the ACM. 40, no. 1, 1997, pp. 60-65. (A very interesting article presenting various ethical issues concerning online business.) Ermann, M.; M. Williams; and M. Shauf. Computers, Ethics and Society, 2nd ed. New York: Oxford University Press, 1997. (An excellent reference covering the issues of possible threats of IT to privacy, freedom, and democracy.) Hart, J. Ethics and Technology: Innovation and Transformation in Community Contexts. Cleveland: Pilgrim Press, 1997. (A short but great text analyzing the benefits and costs of technology from the business point of view.) http://www.acm.org/serving/ (ACM Web pages on public policy including professional ethics, 1999.) Kallman, E.; and J. Grillo. Ethical Decision Making and Information Technology. New York: MitchelllMcGraw-Hill, 1993. (An interesting book on ethics with a number of cases to discuss.) Mason, R "Applying Ethics to Information Technology Issues," Communications of the ACM. 38, no. 1 2 (December 1995), pp. 55-57. (This short article suggests how we can identify and approach situations where ethical considerations arise.) Stichler, R ; and R Hauptman. Ethics, Information and Technology. Jefferson, NC: McFar land Publishing, 1997. (This interesting essay deals with ethical problems on the Web.) Weckert, J.; and D. Adeney. Computer and Information Ethics. Westport, CT: Greenwood Publishing, 1997. (An outstanding book exploring ethical issues in the IT society.)
DISCUSSION QUESTIONS 1. Why
is the use of a system the responsibility of the systems design team and the organization? 2. Is there such thing as a right to privacy? 3. Does technology make it easier to violate an individual's privacy? 4. Is fraud easier with a computer system than with its manual predecessor? 5. What would be your response to a proposal for a national data bank of information on citizens for purposes of social science research? 6. What are the ethical responsibilities of an IS professional? 7. What solutions are there to protect a country's information infrastructure from attack? 8. In your opinion, would it be possible for a group to utilize computers to rig a nation wide election? 9. What steps are necessary to bring the benefits of information technology to the nation' s schools? 1 0 . Do computers make it easier to violate an individual ' s right to privacy? What are the dangers of keeping centralized government records on each citizen? What are the advantages? 11. Do employers have a responsibility to retrain workers replaced by information technology? 12. Why does an innovation like the Internet offer both an opportunity and a threat to de veloping countries? 13. What can be done to reduce the possibility of a computer-based fraud that would cause the failure of a business?
CHAPTER 25: SOCIETAL IMPLICATIONS AND THE FUTURE WITH TECHNOLOGY
14. How could IT be
used to solve some of the pressing problems of society, such as reduc ing the amount of energy consumed? 15. What priorities should be used by underdeveloped countries in trying to develop IT capabilities? 16. What are the implications of continuing decreases in the cost of hardware? 17. What options are there to help countries that are not on the Internet participate in it? What cultural considerations make adoption of this technology difficult in some nations? 18. What are the implications for technology education of the dramatically increasing home market for multimedia computers? 19. How is a highly technological society like the U.S. vulnerable to "electronic aggression"? 20. What kind of safeguards can a company or group of companies adopt to protect vital technology? 21. What does the statement mean, "the network is the computer"? 22. What are the drawbacks of workplace monitoring? Why might management want to monitor worker productivity? 23. What are a manager's responsibilities for information technology?
CHAPTER 25 PROJECT
An Information Technology D i chotomy Some writers suggest that the United States risks falling into a system in which only a small elite with access to and an understanding of information technology will run the economy, while large numbers of undereducated and underemployed individuals perform menial jobs or subsist on welfare payments. Those who make this argument point to the poor quality of education and the lack of computer ac cess in low-income areas. They also cite declining interest in mathematics and sci ence, especially in poorer urban school districts. Locate two or three essays by educators who discuss this problem, and critique them. Do you feel that the arguments have merit? Is the risk that is pointed out real? If so, what are the policy implications? What should government and private citizens do to prevent these dire predictions from coming true? Is an Internet con nection for every school an answer?
699
I access time
The time required to retrieve data from secondary storage and move it to pri mary memory. address The location of a character or word in computer memory. Also the location of a track or record on a random-access device. agents "Intelligent" software modules that perform some task for their human owner, like searching through a network looking for a particular product for sale. algorithm An effective procedure for accomplishing some task. A set of repetitive steps that when followed terminates in a solution. analog Resembling something; analog voice communications represent voice as a con tinuous wave form. ANSI American National Standards Institute; develops industry standards for a number of technologies. application The use of technology to accomplish a task, e.g., processing incoming orders. application program A set of instructions that embody the logic of an application. It should be distinguished from a supervisory program, which controls the operations of the computer. applications package A program or series of programs to accomplish some processing task. architecture An organization' s hardware and software pattern, e.g., a client-server archi tecture features servers with data, programs, and remote clients, usually with a graphical interface capable of accessing data and running programs to process it. arithmetic/logic unit The portion of the central processing unit that performs computations. arithmetic registers CPU registers that actually perform arithmetic operations on data. artificial intelligence A field of computer science that attempts to develop computer applications that exhibit human intelligence in a limited domain. artificial reality The use of technology to create an electronic representation of reality in which the user can manipulate the environment. ASCII American Standard Code for Information Interchange; a 7-bit code used fre quently for asynchronous (character-by-character) communications. assembler A translator that accepts assembly language as input and produces machine language as output. assembly language A language that closely resembles machine language, although mnemonics are substituted for numeric codes in instructions and addresses. Generally, one machine-language statement is produced for each assembly-language statement dur ing the translation process. asynchronous operation Any operation that occurs out of phase with other operations. For example, in certain CPUs, an instruction look-ahead feature, which fetches instructions before they are needed, operates asynchronously with regular instruction processing. asynchronous transfer mode (ATM) A very high speed digital communications service used for connecting different computer networks.
700
GLOSSARY
audio response
Vocal output produced by a special device that contains prerecorded syl lables or synthesizes speech. audit trail A means for tracing data on a source document to an output, such as a report, or for tracing an output to its source. background program In a multiprogramming environment, a program that can be exe cuted whenever the computer is not executing a program having higher priority. Con trast with foreground program. backup Alternative procedures available for temporary or emergency use in case of sys tem failure. bacterium A program that infects a computer, replicates itself, and takes up as much time as possible. bandwidth The range of frequencies for signaling; the difference between the highest and lowest frequencies available on a channel. bar coding A series of bars that can be scanned and recognized by a machine; used to identify products and direct factory equipment. batch computer system A system characterized by indeterminate turnaround time for out put. Data and programs are collected into groups, or batches, and processed sequentially. baud A measure of communications speed; the number of times the signal changes, which is roughly comparable to bits per second. benchmark An existing "typical" program that is executed on a machine to evaluate machine performance. binary A number system using the base 2 and the digits 1 and O. bit A binary digit, either 0 or 1; the smallest unit of information storage and transmission. block mode Synchronous transmission in which characters are sent as a block with beginning and ending delimiters. bridge A device to connect two networks. browser A program for accessing information on the World Wide Web. buffer An area of memory used for temporary storage of data. bus A path used to carry signals, such as a connection between memory and the CPU in a microprocessor. byte Generally, an 8-bit grouping that represents one character or two digits and is oper ated on as a unit. cache A small, high-speed computer memory. CASE (computer-aided software engineering) Hardware and software that help to au tomate parts of the systems life cycle. case-based reasoning In Artificial Intelligence, programs that draw on a database of stored cases to locate problems similar to the one being faced by a user as a basis for recommending a solution. cellular communications A type of communications in which low-power radio waves are transmitted to a stationary receiver. A computer "hands off' a conversation to an ad joining receiver as one of the communications devices moves toward it. An area is di vided into many small cells so that a large number of connections are possible at one time using a minimum number of radio frequencies. central processing unit (CPU) The part of the computer that controls its operations; it contains the logic of the machine; for PCs, the CPU is generally on a single chip or a small set of chips (Intel makes the 486 and Pentium chips that are CPUs). channel A computer component with logic capabilities that transfers input and output from main memory to secondary memory or peripherals, and vice versa.
701
702
GLOSSARY
character Storing characters like the letter "a" as a code consisting of 7 or 8 bits; the common way most programs process data (like a word processor). character mode Transmission that is serial, one character at a time. check bit A word or a fixed-length group of characters to detect errors. check digit A number added to a key as a result of some calculation on the key. When data are entered, the computation is performed again and compared with the check digit to ensure correct entry. chip Small (6 x 6 mm) pieces of material, generally silicon, with various electronic com ponents on the chip; the number of components is in the millions. CIO Chief information officer of a firm. circuit switching Communications in which a dedicated circuit is established between two devices, as with a conventional telephone circuit. CISC Complex instruction set computers; the original strategy for developing processors featuring microprogramming and a large variety of instructions. client The user' s computer in a client-server system; contains local programs and storage. client-server architecture A computer architecture in which a number of computers in the PC to workstation class are clients of a larger computer that acts as a server; the server provides data and programs for the clients and in some cases does calculations for a client. COBOL A popular business computing language frequently used on mainframe computers. cognitive style The individual' s orientation toward approaching decisions in a particular way, for example, from an analytic or heuristic view. compatibility The extent to which one can use programs, data, and/or devices of one computer system on another without modification. compiler A translator for high-level languages. Generally, several machine-language statements are generated for each high-level language statement. compression The use of an algorithm to reduce the amount of data that must be transmit ted over communications lines. concentrator A device with some local storage that accepts data from several low-speed lines and transmits them over a single high-speed line to a computer installation. connectivity Related to having different computers and devices able to communicate with each other. control of computer systems Techniques to ensure the integrity and accuracy of com puter processing. control unit (controller) A device that serves as an interface between channel com mands and secondary-storage or peripheral devices. core storage A medium of computer storage; for most second- and third-generation com puters, the term is used synonymously with "primary memory." CRT (cathode-ray tube) A terminal resembling an ordinary television set that can dis play a large number of characters rapidly; many also have graphics capabilities. cycle time Either the time required to access information from primary storage and bring it to the CPU or the time required to fetch, decode, and execute an instruction within the CPU itself. data definition language The language used with a database management system to de scribe the relationships among data elements. data dictionary A component of a database management system that contains names of data elements and information about them. data flow diagram (DFD) A graphical representation of an information system using a small set of symbols. data structures The relationships among different fields of data on secondary storage.
GLOSSARY
database A comprehensive, integrated collection of data organized to avoid duplication of data and permit easy retrieval of information. database administrator The individual in the organization with responsibility for the design and control of databases. database management system Software that organizes, catalogs, stores, retrieves, and maintains data in a database. debugging The task of finding and correcting mistakes in a program. decision support system A system designed to support decision makers, generally in volving interactive computing and focused on one particular business problem. dedicated package A software package designed for a specific task, such as accounts re ceivable or payroll. demodulation The process of decoding the information from a modulated carrier wave; the reverse of modulation. digital Represented as a digit, usually a 0 or 1 . direct access The ability to access data without reading a large amount of irrelevant data; access from a disk is direct while access from a tape is sequential. directory A dictionary or an algorithm for obtaining the address of logical records on a storage device. disk A random-access magnetic device used for secondary storage in computer systems. diskette A direct-access storage medium that is flexible; read/write heads of the drive ac tually touch the surface of the diskette. distributed processing The dispersion and use of computers among geographically sep arated locations; the computers are connected by a communications network. documentation Written descriptions of a system, usually with instructions on how to op erate the system. DOS The operating system used on many IBM personal computers. duplex Data transmission occurs in both directions simultaneously using two separate paths. EBCDIC Extended Binary Coded Decimal Interchange Code; an 8-bit code used by IBM to represent characters. EDI Electronic Data (or Document) Interchange in which two organizations replace paper in transactions with electronic connections and transmission of data. electronic commerce The use of electronic networks as a market for buying and selling goods and services. electronic customer/supplier relationships The use of electronic connections like EDI to connect with customers and suppliers for processing transactions; these connections increase speed and reduce errors. electrouic mail A system in which computer users have an electronic mailbox and send messages using terminals; communications occur at the convenience of the user. electronic workflows The routing of work like an insurance application electronically within a company rather than in paper form. emulation Using a combination of hardware and software to make one computer device perform like another. encryption The coding of a data stream to prevent unauthorized access to the data. end-user programming Users of information employ very high level languages and other tools to access information without having a computer professional develop a pro gram for them. enhancement The process of making changes and improvements in operational programs.
703
704
GLOSSARY
entity-relationship (ER) diagram
A data model in which data structures are conceived of as entities that are connected by relationships. ethernet The most popular communications protocol on local area networks. execnte cycle (phase) The interpretation of an instruction and the execution of the opera tion it signifies, performed by the CPU. executive information system A system designed to support the special needs of top management. executive program The control program that schedules and manages the computer' s resources. expert systems An application of Artificial Intelligence in which a system captures the expertise of a human and makes it available to others. fault tolerant Computer systems that diagnose faults and reconfigure themselves; used for on-line applications. fetch cycle Retrieving data or instructions from memory and moving them to the CPU. fiber optic Thin strands of glass that carry data as a series of light pulses representing a 0 or 1 . field A group of bit positions within an instruction. A subdivision of a record consisting of a group of characters. firewall A hardware device, a computer, or a router, through which all communications packets into an organization must pass; the firewall disallows access to certain Internet Web sites. firmware An algorithm or process that is part way between software and hardware; e.g., taking a well-understood program and encoding it on a chip to make it run faster. fixed-length record A record in which the length and position of each field is fixed for all processing. fixed point The representation of numbers as integers with no digits to the right of the decimal point. floating point The representation of a number as a quantity times a base raised to a power; for example, the number 472 as 4.72 times 102• floppy See Diskette. foreground program The highest-priority program in a multiprogramming environment. fourth-generation language A very high-level language that produces a number of high-level language statements for every statement in the fourth-generation language. frame relay A high-speed packet switched-communications service that can be used to link LANs in different locations. genetic algorithm An approach to problem solving that involves repeated cycles of se lecting solutions, evaluating them, mutating the solution, and starting again. graphics Output involving figures, graphs, drawings, and/or animation. group DSSs Decision-support systems designed to support a group of managers who have to make a decision. graphical user interface (GUI) A computer interface characterized by graphics in addi tion to text; windowing interfaces are graphical. groupware The use of programs on a computer network to facilitate the sharing of infor mation and communications between a group of people who have a common task in a shared environment. hardware The physical components of the computer system. heuristic programs Programs that are not guaranteed to arrive at an optimal or even an acceptable solution; nonalgorithmic coding.
GLOSSARY
high-level language A language closer to English than assembler language that, when translated, produces many machine-language instructions for each input statement. home page The first page of material that an organization or individual presents on the World Wide Web. HTTP, HTML Hypertext transfer protocol: the protocol for transmitting HTML docu ments. Hypertext markup language is the language used to create hypertext documents for the World Wide Web. hub A device used in local area networks; computers in one location like the floor of a building all connect to the hub, which connects to the network. hypertext The use of references embedded (hidden) in text to allow a user to follow a topic through a document or different documents. icon A small graphical representation of a program or command that is displayed on a user's computer screen; clicking on the icon with a mouse causes the program to run or some action to be taken. identifiers The mnemonic symbols assigned to variables in a program. image Storing information more like a photograph than like coded characters; an image might be represented by a resolution of 300 dots per inch or 300 x 300 dots in a square inch; see character. index Some type of table to relate keys to addresses in a direct-access file. information Data that can be interpreted by an individual to provide meaning; a tangible or intangible entity that reduces uncertainty about a state or an event. information resources management (IRM) The active management of information as a corporate resource. information technology (IT) The combination of computers and communications in cluding all types of computers from desktop workstations to supercomputers and all types of networks; also fax machines, pagers, and communications modes like cable, satellite, and wireless. input/output Devices attached to computers that accept input, for example, a scanner, or that produce output, for example, a printer. inquiry system A system in which inquiries are processed, but updating is done in batch mode. inquiry-and-post system A system in which inquiries are made and data are entered and posted to a file for later updating. instruction location counter A register in the CPU that points to the next instruction to be fetched for execution. instruction register A CPU register that holds the instruction, decodes it, and then executes it. instruction set The repertoire of instructions available on a computer. integer A number without decimal places; e.g., 32 is an integer. integrated circuits The ability to put many electronic circuits on a silicon chip; they made possible today ' s computers, which consist of processor chips and memory chips. intelligent devices The addition of logic to a device or product, usually through the in corporation of an embedded chip. interface The boundary between two entities that interact. Internet A network of networks; a worldwide network linking millions of users on their own networks. At first used for exchanging information among scientists and academ ics, more recently being used commercially. Suggested by some as the beginning of a national information superhighway.
705
706
GLOSSARY
interorganizational system A system that connects organizations electronically. interpreter A hardware or software program that examines an instruction and exe
cutes it. interrnpt
A signal that causes the current program in the CPU to terminate execution. De pending on the nature of the interrupt, a different program may be loaded and executed. ISDN (integrated services digital network) A network from common carriers that lets the subscriber send data and voice traffic over a digital network; the network provides a number of services to the user. iteration A single cycle of a repetitively executed series of steps. JIT Just-in-time inventory in which parts arrive j ust before they are needed for assembly into a product. joint-applications development (JAD) An approach to systems design that stresses the use of a design team consisting of users and systems analysts. key The part of a record used for identification and reference, for example, an employee number. knowledge base Data and rules about the data form the knowledge base of expert systems. latency The time required for a mechanical storage device to begin transmitting data after a request. For a movable-head disk drive, the seek time to position the read/write heads plus the rotational delay time. legacy system Generally refers to an old mainframe application that has not been up dated; typically it would be very costly to reprogram, and yet the system is probably outdated. list A group of logically related items that are stored with pointers to the next item on the list. Also, a series of pointers running through a storage file. loader A program that places a translated computer program in primary memory before its execution. local area network (LAN) A collection of computers and other devices connected in a local area such as one floor of a building or an entire building; usually LANs are linked to form wide area networks. logical record Fields associated on the basis of their relationship to each other. logic bomb A program that waits for a particular event such as a given date, and then does some damage to a system. machine language Computer programming languages have to be translated into machine language, the actual language the computer hardware is capable of executing. mainframe The original kind of computer; associated today with large computers using proprietary hardware and software and often having cost/performance ratios that are worse than smaller computers. maintenance The process of modifying operational programs to fix errors or add enhancements. MAN (metropolitan area network) A network that connects LANs and other devices in campus of several buildings or in a city. managerial control decisions Decisions primarily involving personnel and financial control, concerned with ensuring that resources are applied to achieving the goals of the organization. megahertz A measure of transmission frequencies; megacycle or millions of cycles per second. microcomputer A small computer, often for a single user or a small number of simulta neous users. Developed from advances in chip fabrication such that only a few chips are needed to produce an entire computer.
GLOSSARY
microprogramming
Breaking down the machine language instructions of a computer into even finer steps that are used to create special, often complex, instructions. minicomputer Originally developed to compete with mainframes, offering fewer features and a better costlperfomance ratio; increasingly being called midrange computers. mnemonics Alphabetic symbols used in place of numeric codes to facilitate the recogni tion and use of computer instructions. model A tangible or intangible representation of some physical event, entity, or process. modem (modulate and demodulate) A device that converts digital computer signals into analog form and modulates them for transmission. Demodulation is the reverse process that occurs at the receiving point. modular programming The subdivision of a system and of programming requirements into small building blocks to reduce programming complexity and take advantage of common routines. modulation The coding of a digital signal onto an analog one, for example, by changing the amplitude of the carrier signal to represent a 0 or a 1 . monitor The control program that schedules and manages the computer's resources. multimedia The use of more than one medium in presenting information, for example, the combination of graphics, video, and audio information. multiplexing The combination of several low-speed signals onto a higher-speed line for communications. multiplexor A device that combines signals received from a series of low-speed lines and transmits them over a high-speed line. No storage is provided, and signals must be demultiplexed on the receiving end. multiprocessing A technique for executing two or more instruction sequences simultane ously in one computer system by the use of more than one processing unit. multiprogramming The presence of more than one semiactive program in primary memory at the same time; by switching from program to program, the computer appears to be executing all concurrently. MVS The most popular IBM mainframe operating system, a system that controls the re sources of the computer; has matured into OS/390. network A collection of communications devices, and often computers connected to gether via communications lines and/or satellites. network interface card (NIC) A card, typically for Ethernet, that interfaces a computer to a network. neural network An artificial-intelligence approach in which software (or hardware) is constructed to simulate the way in which the human brain is thought to function; used for pattern recognition after the user trains the network. nonprocedural languages Languages in which the user tells the computer what to do rather than exactly how to do the task. Statements are more declarative of what is to happen than specific about the procedure to produce the desired results. nonprogrammed decisions Decisions that are unstructured and for which an algorithm for solution cannot be specified. normalization A procedure for simplifying relational databases and reducing the chances for updating errors. object language The output of a translator, usually machine language. object oriented A systems development and programming philosophy that views sys tem components as objects that are manipulated by programs, advocates claim that object-oriented programming will save development time, effort, and cost.
707
708
GLOSSARY
OCR (optical character recognition)
The machine recognition of certain type styles and/or printed and handwritten characters. off-line Describes any operation that is not directly controlled by the CPU. on-line system A system that has the capability to provide direct communication be tween the computer and remote terminals; files are updated immediately as data are entered. on-line transactions processing (OLTP) Systems that process high volumes of on-line transactions such as credit card charge authorizations. on-line updating Pertaining to a system in which the data entered are used to update the files immediately. operating system A supervisory program that controls the resources of the computer. operational control decisions Day-to-day decisions concerned with the continuing oper ations of a company, such as inventory management. optical character recognition (OCR) The scanning of a document and recognition of the text in the document. optical disk A disk that holds a great deal of data that is "burned" on with a laser. Most of today's optical disks can be written once and then read many times. Optical disks on which one can write more than once are also available. optical storage Storage devices using laser optical disks, characterized by extremely high densities of data. organization A rational coordination of activities of a group of people for the purpose of achieving some goal. outsourcing The practice of contracting out major portions of a business, for example, outsourcing the communications activities of a company. packet switching A communications device breaks a message up into standard-sized packets, each with an address; the packets are sent to their destination via the best avail able path through a network. paging The segmentation of storage into small units that are moved automatically by hardware or software between primary and secondary storage to give the programmer a virtual memory that is larger than primary memory. parallel testing The testing of a new system at the same time an existing system is in operation. The results from both systems are compared. parse Separation of an input string of symbols into its basic components. peripherals Input-output devices connected to a computer system. personal computers The Apple Macintosh and IBM PC; desktop machines with com modity processor chips producing the most favorable cost/performance ratio of contem porary computers. personal digital assistant (PDA) A small device that is designed to be portable and to help its user by storing and retrieving notes, addresses, phone numbers, and other infor mation; can have communications capabilities. physical record One or more logical records read into or written from main storage as a unit. pipelined A central processing unit that breaks instructions into pieces and works on each piece in sequence like an assembly line in a factory. pointer Data that indicate the location of a variable or record of interest. point-to-point protocol A protocol used on serial lines to transmit network protocols like Ethernet; used by Internet Service Providers for telephone connections with customers. primary memory The memory in which programs and data are stored and from which they are generally executed; main storage.
GLOSSARY
problem-oriented A language specifically designed for one particular type of problem, such as statistical computations. problem program A user-written program that uses only nonprivileged instructions. It should be distinguished from a supervisory, or control, program, which may have privi leged instructions. procedural language A language designed to facilitate the coding of algorithms to solve a problem, for example, COBOL. program A set of instructions that directs the computer to perform a specific series of operations. programmed decisions Generally, decisions that can be made automatically by follow ing certain rules and procedures. protection Maintenance of the integrity of information in storage by preventing unautho rized changes. protocol A set of rules or procedures for devices to communicate with each other. prototype A model of a system or a version without all the final features desired used to get early feedback from users. pure procedure A program in which no part of the code modifies itself. Because a reen trant program is not modified during execution, it can be shared by many users. query language A language used to provide access to data stored in a database or file. random access The ability to retrieve records without serially s earching a file. random-access memory (RAM) Memory that can be read or written under program control. read-only memory (ROM) Memory that cannot be written under program control; used to store microinstructions. reasonableness checks General range checks on data to be sure that values are within reason. recognition The process of converting scanned images, which are represented by pat terns of dots, into the character codes of the computer. record, logical A collection of related data items. record, physical One or more logical records combined to increase input-output speeds and to reduce space required for storage. redundant array of inexpensive disks (RAID) A disk storage device consisting of many small disk drives such as those found on PC; various versions of RAID provide backup by writing data twice on different drives. reengineering An approach to developing systems that focuses on major improvements rather than incremental changes; also known as business process redesign. reentrant program Synonymous with pure procedure. registers In general, storage locations capable of holding data. In particular, index regis ters that can be used to modify instruction addresses, or arithmetic registers that perform calculations. relational database A database in which data are arranged in tables; columns in the table are fields in the database and rows are records. report program generator (RPG) A class of languages used to prepare programs to print reports quickly from a set of files. Can also be used to program complete applications. response time The time from submission of a request until the computer responds. RISC (reduced instruction set computer) A computer in which the CPU has a stream lined set of instructions for the operations most often executed. The computer is not mi croprogrammed and performs most operations in high-speed registers.
709
71 0
GLOSSARY
rotational delay
On rotating secondary-memory devices, the time required for a particu lar record to arrive under the read-write head. router A hardware device that routes packets to different locations on a network. satellite communications The use of orbiting satellites to receive, amplify, and retrans mit data to earth stations. scanner A computer input device that reads bar codes usually employing a laser of some type; also a device that reads printed text and in some cases, hand-printed characters. scanning The process of "reading" or converting a document for storage in a computer; similar to taking a picture of a document. secondary memory (storage) Random-access devices such as disks; programs are not executed from secondary memory devices but must be loaded into primary memory. seek time For movable-arm disks, the time required for the reading mechanism to posi tion itself over the track desired. semantics The meaning of a programming language statement or group of statements. semiconductor A small component having an electrical conductivity between the high conductivity of metals and the low conductivity of insulators. server The computer that provides data and some programs in a client-server architecture. simplex Data transmission in one direction at a time. simulation The modeling of some process that often involves the use of a computer pro gram and probability distributions. simulator A software program used to execute programs written for one machine on another. software Instructions that control the physical hardware of the computer system. source language The input language to a translation process. SQL (structured query language) A language that is becoming a standard for retrieving data from databases. storage address register A register that holds the address of a memory location being referenced by the CPU or channel. storage buffer register A register that holds data to be moved to or from main memory. strategic-planning decisions Decisions of a long-term nature that deal with setting the strategy and objectives of the firm. structured design An approach to design that attempts to provide discipline for the de signers and to clarify the design itself. structured programming A modular approach to program development that emphasizes stepwise refinement, simple control structures, and short one-entry-pointlone-exit-point modules. supercomputers Very large and fast computers designed for scientific computations. superscalar The ability of a chip to process more than one instruction at a time. supervisor The control program that schedules and manages the computer's resources. synchronous Events that are coordinated and controlled. syntax The physical structure of a programming language or statement. systems programmer A programmer who works on the software associated with an op erating or supervisory system. TCP/IP The communications protocol used by the Internet. technological infrastructure The shared technology in a firm that is used by all employ ees, as opposed to a system developed for an individual or small group; for example, communications networks. technological leveling The use of information technology to reduce the number of levels of management in an organization.
GLOSSARY
technological matrixing The use of e-mail and groupware to create temporary work groups that cut across organizational boundaries. telecommunications The transmission of signals over a long distance, through either pri vate or public carriers. terminal A device used to communicate with a central computer from a remote location, usually featuring a typewriter-like keyboard. T-Form organization An organization enabled by IT organization design variables; typi cally an organization with a flat structure, extensive electronic connections to suppliers and customers, virtual components, matrixed mcmagement, and an advanced IT infrastructure. throughput The amount of processing done by a system in a given unit of time. time-sharing An on-line system that provides computer services (induding computa tional capacity) to a number of users at geographically dispersed terminals. top-down design Planning of a system by looking first at the major function, then at its subfunctions, and so on, until the scope and details of the system are fully understood. trade-off The pros and cons of different alternatives; for example, one often is forced to trade cost savings for performance. transaction A basic communication with 2. computer system, such as the receipt of cash from a customer. transactions processing systems Basic systems that process routine transactions in an organization, such as the entry of customer orders. translator A program that accepts a source language and produces an output, or target, language that differs in some respects from the source language. trojan horse A program that attempts to disable security checks on a computer so that an unauthorized individual can penetrate the system. turnaround document A computer-prepared document, usually a printed form, that is sent to a customer. When returned to the sender, the document frequently can be reen tered into the computer without modification. turnaround time The length of time elapsing between the submission of input and the receipt of output. turnkey system A complete computer system with software installed for customer use. uncertainty Lack of knowledge about a state or event. universal product code (UPC) A bar-coded label found on many retail and grocery goods that uniquely identifies the product and its package size. Unix A popular operating system first used on minicomputers; it is available for a num ber of computers, which makes programs running under Unix easier to move among machines. URL (universal resource locator) The address of a web page. variable-length record A record in which the number and/or length of fields may vary from those of other records accessed by the same program. very large scale integration (VLSI) The production of computer chips with millions of components on each chip. virtual Something that appears to exist, but does not exist in reality in the same way; for example, a group of workers looks like a physical department on an organization chart, but each member is actually in a different location and work is accomplished through electronic communications. virtual machine The computer system as it appears to the user. The term was first used to refer to the extension of main memory to almost infinite capacity by the automatic use of secondary storage. The operating s.ystem automatically moves portions of a pro gram that are too large for primary memOlY to and from secondary memory.
71 1
71 2
GLOSSARY
virtual memory
Addressable space beyond physical memory that appears to the user as real; it is provided through a combination of hardware and software techniques. virtual organization An organization that appears to an outsider to be complete, but is in fact composed of various components that do not necessarily belong to it, for example, its suppliers may actually have all its raw materials inventory and deliver goods as needed. virtual reality The use of technology to create a simulated world; often used in games, but also in industry and medicine. A flight simulator is an example of the use of virtual reality. virus A program that infects an executable program on a computer and causes it to do some unplanned activity, often damaging the files or programs on the machine. wide area network (WAN) A network that spans a large geographic area such as several sites in a city or a number of sites in a country. windows A graphical user interface that runs on top of DOS on personal computers. Windows 98 is the newest version and is a complete operating system in its own right. Windows NT is another similar operating system that is used often on servers and some times on desktops. wireless Communications that does not require wires such as a conventional tele phone; using radio frequencies for personal communications is an example of a wire less system. word A combination of bits that forms a logical storage grouping. A word may be further subdivided into bytes, which can be addressed by instructions. workstation A powerful computer generally assigned to one user; a desktop computer usually having at least a Pentium processor or better or a Sun Workstation; the work station should have windowing software. World Wide Web (WWW) A series of links among related topics among computers on the Internet; a browser lets the user access related topics automatically, and the user does not know that he or she is moving from one computer to another. worm A program that wanders through a computer network looking for machines on which it can run; the program can quickly overload a network. X.12 A standard for interchanging data among companies developed by the American National Standards Institute (ANSI). zero-slot LAN A peer-to-peer LAN connected through existing ports on the computer and thus not requiring the use of a network interface card, which takes up a slot in the computer.
I Ii ill
ACM Committee on Computers and Public Policy. "A Problem List of Issues Concerning Computers and Public Policy," Communications of the ACM. 17, no. 9 (September 1974), pp. 495-503. Alter, S. Decision Support Systems: Current Practice and Continuing Challenges. Read ing, MA: Addison-Wesley, 1980. "Amex Builds an Expert System to Assist Its Credit Analysts," PC Week (November 17, 1987). Anthony, R. Planning and Control Systems: A Framework for Analysis. Boston: Harvard University, Graduate School of Business Administration, Division of Research, 1965. Applegate, L.; W. McFarlan; and J. McKenney. Corporate Information Systems Manage ment. 5th ed. New York: McGraw-Hill, 1999. Applegate, L.; and D. Stoddard, "Chemical Bank: Technology Support for Cooperative Work." Boston: Harvard Business School Press, 1995. Bakos, Y., "The Emerging Role of Electronic Marketplaces on the Internet," Communica tions ofACM. 4 1 , no. 8 (August 1998), pp. 35-42. Banker, R.; R. Kauffman; and M. Mahmood. Strategic Information Technology Manage ment: Perspectives on Organizational Growth and Competitive Advantage. Harrisburg, PA: Idea Group Publishing, 1993. Barker, V.; and D. O'Connor. "Expert Systems for Configuration at Digital: XCON and Beyond," Communications of the ACM. 32, no. 3 (March 1989), pp. 298-3 1 8 . Barney, J . , "Firm Resources and Sustained Competitive Advantage," Journal of Manage ment. 17, no. 1 ( 1991), pp. 99-503. Bartlett, C.; and S . Ghoshal. Managing Across Borders. Cambridge, MA: Harvard Busi ness School Press, 1989. Bell, W. J. et al. "Improving the Distribution of Industrial Gases with On-line Computer ized Routing and Scheduling Optimizer," Interfaces. 1 3 , no. 6 (December 1 983), pp. 4-23. Benjamin, R. I.; and J. Blunt. "Critical IT Issues: The Next Ten Years," Sloan Manage ment Review. 33, no. 4 (Summer 1992), pp. 7-19. Bic, L.; and A. Shaw. The Logical Design of Operating Systems. Englewood Cliffs, NJ: Prentice-Hall, 1988. Bjorn-Anderson, N.; and J. Turner, "Creating the 2 1 Century Organization: The Metamor phosis of Oticon," IFIP Working Group 8.2 Conference. August 1994. Black, U. Computer Networking. Englewood Cliffs, NJ: Prentice-Hall, 1989. Boehm, B,; A. Egyed; J. Kwan; D. Port; A Shah; and R. Madachy. "Using the WinWin Spiral Model: A Case Study," Computer. July 1998, pp. 33-44. Bradley, S.; J. Hausman; and R. Nolan. Globalization, Technology, and Competition: The Fusion of Computers and Telecommunications in the 1990s. Boston: Harvard Business School Press, 1993. Carr, H. C. Managing End-User Computing. Englewood Cliffs, NJ: Prentice-Hall, 1988.
71 3
714
BIBLIOGRAPHY
Clemons, E. K. "MAC-A Venture in Shared ATM Networks," 1MIS. 7, no. I (Summer 1990), pp. 5-25. Clemons, E. K.; and M. Row. "Information Technology at Rosenbluth Travel," 1MIS. 8, no. 2 (Fall 1991), pp. 53-79. Clemons, E.; and B. Weber. "Barclays de Zoete Wedd's TRADE: Evaluating the Competi tive Impact of a Strategic Information System." Philadelphia: Wharton Working Paper 89-03-08, 1 99 1 . Clifford, J . ; H . C . Lucas, Jr. ; and R Srikanth. "Integrating Symbolic and Mathematical Models Through AESOP: A System for Stock Options Pricing," Information Systems Research. (December 1992). Coad, P.; and E. Yourdon. Object-Oriented Analysis. Englewood Cliffs, NJ: Prentice Hall, 1990. Copeland, D.; and J. McKenney. "Airline Reservation Systems: Lessons from History," MIS Quarterly. 12, no. 3 (September 1988), pp. 353-370. Davenport; T. Process Innovation: Reengineering Work through Information Technology. Boston: Harvard Business School Press, 1993. Davenport, T. H.; R Eccles; and L. Prusak. "Information Politics," Sloan Management Re view. 34, no. 1 (Fall 1992), pp. 53-65. Davis, O. B . ; and M. Olson. Management Information Systems: Conceptual Foundations, Structure, and Development. 2nd ed. New York: McGraw-Hill, 1985. De Marco, T. Structured Analysis and System Specification. Englewood Cliffs, NJ: Prentice-Hall, 1 979. Deans, C.; and J. Jurison. Information Technology in a Global Business Environment. Dan vers, MA: Boyd & Fraser, 1996. Deans, C.; and M. Kane. International Dimensions of Information Systems and Technol ogy. Boston: PWS-Kent, 1992. Dearborn, 0.; and H. Simon. "Selective Perception: A Note on the Departmental Identifi cation of Executives," Sociometry. 2 1 ( 1958), pp. 140-144. Dearden, J.; and R L. Nolan. "How to Control the Computer Resource," Harvard Business Review. (November-December 1973), p. 68. Deng, P. ; and C. Fuhr. "Using an Object-Oriented Approach to the Development of a Rela tional Database Application System," Information and Management. 29, no. 2 (August 1995), pp. 107- 1 2 1 . Dos Santos, B. "Justifying Investments i n New Information Technologies," 1MIS. 7, no. 4 (Spring 1 99 1 ), pp. 7 1-90. Dos Santos, B . ; and K. Peffers, "Rewards to Investors in Innovative Information Technol ogy Applications: First Movers and Early Followers in ATMs," Organization Science. 6, no. 3, (May-June 1 995), pp. 241-259. Earl, M.; and D. Feeny. "Is Your CIO Adding Value?" Sloan Management Review. Spring 1 994, pp. 1 1-20. Emery, J. "CostlBenefit Analysis of Information Systems," in Systems Analysis Tech niques. J. D. Couger and R W. Knapp, eds., New York: Wiley, 1974. Emery, J. C. MIS: The Critical Strategic Resource. New York: Oxford University Press, 1987. Fichman, R; and C. Kemerer. "Adoption of Software Engineering Process Innovations: The Case of Object Orientation," Sloan Management Review. 32, no. 2 (Winter 1993), pp. 7-22. Galal, H.; Stoddard, D.; Nolan, R; and Kau, J. "VeriFone: The Transaction Automation Company (A)," Boston: Harvard Business School, 1995. Galbraith, J.; and E. Lawler. Organizing for the Future. San Francisco: Jossey-Bass, 1973.
BIBLIOGRAPHY
Gane, C.; and T. Sarson. Structured Systems Analysis Tools and Techniques. Englewood Cliffs, NJ: Prentice-Hall, 1979. Garud, R.; and H,. C. Lucas, Jr., "Virtual Organizations: What You See May Not Be What You Get." New York: Stem School, NYU working paper, 1997. Goldman, J. E. Applied Data Communications. 2nd ed. New York, John Wiley, 1998. Gorry, G. A.; and M. S. Scott Morton. "A Framework for Management Information Sys tems," Sloan Management Review. 13, no. 1 ( 197 1 ), pp. 55-70. Gurbaxani, V.; and S. Whang. "The Impact of Information Systems on Organizations and Markets," Communications of the ACM. 34, no. 1 (January 1991), pp. 59-73. Hammer, M. "Reengineering Work: Don't Automate, Obliterate," Harvard Business Re view. (July-August 1990), pp. 1 04-1 1 2. Hammer, M.; and J. Champy. Reengineering the Corporation. New York: HarperCollins, 1993. Hellerman, H. Digital Computer System Principles. New York: McGraw-Hill, 1967. Hodges, D. "Microelectronic Memories," Scientific American. 237, no. 3 (September 1977), pp. 1 30-145. Ives, B.; and S. Jarvenpaa. "The Global Network Organization of the Future: Information Management Opportunities and Challenges," JMIS. 10, no. 4 (Spring 1994), pp. 25-57. Ives, B.; and G. Learmonth. "The Information System As a Competitive Weapon," Com munications of the ACM. 27, no. 1 2 (December 1984), pp. 1 1 93-120 1 . Ives, B . ; and S. Jarvenpaa. "Global Informational Technology: Some Lessons from Prac tice," International Information Systems. 1 , no. 3 (July 1992), pp. 1-15. Jelassi, T.; and O. Figon. "Competing Through EDI at Brun Passot: Achievements in France and Ambitions for the Single European Market," MIS Quarterly. 1 8, no. 4 (De cember 1 994), pp. 337-352. Kallman, E.; and J. Grillo. Ethical Decision Making and Information Technology. New York: Mitche1l1McGraw-Hill, 1993. Kambil, A.; and J. Turner. "Outsourcing of Information Systems As a Strategy for Organi zational Alignment and Transformation," Unpublished paper. New York: Stem School, NYU, 1994. Keen, P. Shaping the Future. Boston: Harvard Business School Press, 1 99 1 . Kent, W . "A Simple Guide to Five Normal Forms in Relational Database Theory," Com munications of the ACM. 26, no. 2 (February 1983), pp. 120-125. King, J.; and B. Konsynski, "Singapore TradeNet: A Tale of One City," Harvard Business School, 1994. Kogut, B . ; and U. Zander, "Knowledge of the Firm, Combinative Capabilities, and the Replication of Technology," Organization Science. 3 (1992), pp. 383-397. Korth, H.; and A. Silberschatz. Database System Concepts. New York: McGraw-Hill, 1986. Kraut, R. E. (ed.). Technology and the Transformation of White-Collar Work. Hillsdale, NJ: Erlbaum, 1987. Kraut, R.; S. Dumais; and S. Koch. "Computerization, Productivity, and Quality of Work Life," Communications of the ACM. 32, no. 2 (February 1989), pp. 220-238. Kronke, D. Database Processing. 4th ed. New York: Macmillan, 1992. Lacity, M.; and R. Hirschheim. "The Information Systems Outsourcing B andwagon," Sloan Management Review. Fall 1993, pp. 73-86. Landes, D. The Wealth and Poverty of Nations: Why Some Are So Rich and Some Are So Poor. New York: W. W. Norton, 1998. Lawless, M.; and L. Price. "An Agency Perspective on New Technology Champions," Or ganization Science. 3, no. 3 (August 1992), pp. 342-355.
715
71 6
BIBLIOGRAPHY
Leavitt, H. J.; and T. L. Whisler. "Management in the 1980s," Harvard Business Review. (November-December 1958), pp. 4 1--48. Lientz, B. P.; E. B . Swanson; and G. E. Tompkins. "Characteristics of Application Software Maintenance," Communications of the ACM. 2 1 , no. 6 (June 19, 1978), pp. 466--47 1 . Loh, L.; and N. Venkatraman. "Determinants of Information Technology Outsourcing: A Cross-Sectional Analysis," JMIS. 9, no. 1 (Summer 1992), pp. 7-24. Lucas, H. C.; Jr. Implementation: The Key to Successful Information Systems. New York: Columbia University Press, 1981. . Information Technology and the Productivity Paradox: Assessing the Value of In vesting in IT. New York: Oxford University Press, 1999.
___
. The T-Form Organization: Using Information Technology to Design Organiza tionsfor the 21st Century. San Francisco: Jossey-Bass, 1996. . Managing Information Services. New York: Macmillan, 1989. . The Analysis, Design, and Implementation of Information Systems. 4th ed. New
___
___ ___
York: McGraw-Hill, 1992. . Toward Creative Systems Design. New York: Columbia University Press, 1974. . Why Information Systems Fail. New York: Columbia University Press, 1975. Lucas, H. C.; and J. Baroudi. The Role of lnformation Technology in Organization Design. JMIS. 10, no. 4 (Spring 1994), pp .. 9-23. Lucas, H. c., Jr.; and E. Walton. "Implementing Packaged Software," MIS Quarterly. 12, no. 4 (December 1989), pp. 537-549. Lucas, H. C., Jr.; and J. R Moore, Jr. "A Multiple-Criterion Scoring Approach to Informa tion System Project Selection," Infor. 14, no. 1 (February 1976), pp. 1-12. Lucas, H. c., Jr.; and M. Olson. "The Impact of Technology on Organizational flexibil ity," Journal of Organizational Computing. 4, no. 2 (1994), pp. 155-176. Lucas, H. c., Jr.; and R Schwartz (eds.). The Challenge of Information Technology for the Securities Markets: Liquidity, Volatility and Global Trading. Homewood, IL: Dow Jones Irwin, 1989. Lucas, H. C., Jr.; and J. Turner. "A Top Management Policy for Information Systems," Sloan Management Review. (Spring 1982), pp. 26-36. Lucas, H. c., Jr. ; D. Berndt; and G. Truman. "A Reengineering Framework for Evaluating a Financial Imaging System," Communications of the ACM. 39, no. 5 (May 1 996), pp. 86-96. Lucas, H. c., Jr.; M. Ginzberg; and R Schultz. Implementing Information Systems: Testing a Structural Model. Norwood, NJ: Ablex, 1 99 1 . Luconi, F . L . ; T . Malone; and M. S. Scott Morton. "Expert Systems: The Next Challenge for Managers," Sloan Management Review. (Summer 1986), pp. 3-14. Malone, T.; R Benjamin; and J. Yates. "Electronic Markets and Electronic Hierarchies," Communications of the ACM. 30, no. 6 (June 1987), pp. 484--497. Martin, E. W.; D. DeHayes; J. Hoffer; and W. Perkins. Managing Information Technology: What Managers Need to Know. New York: Macmillan, 1 99 1 . Martin, J.; and L . McClure. "Buying Software Off the Rack," Harvard Business Review. (November-December 1983), pp. 32-60. Mason, R. "Applying Ethics to Information Technology Issues," Communications of the ACM. 38, no. 1 2 (December 1995), pp. 55-57. Mason, R E. A.; and T. T. Carey. "Prototyping Interactive Information Systems," Commu nications ofthe ACM. 26, no. 5 (May 1983), pp. 347-354. Mason, R; and I. Mitroff. "A Program for Research in Management Information Systems," Management Science. 19, no. 5 (January 1973), pp. 475--487. ___
___
BIBLIOGRAPHY
McFarlan, W. ; and R. Nolan. "How to Manage an IT Outsourcing Alliance," Sloan Man agement Review. (Winter 1995), pp. 9-23. McNurlin, B.; and R. Sprague. Information Systems Management in Practice. 4th ed. Englewood Cliffs, NJ: Prentice-Hall, 1998. Mintzberg, H. The Nature ofManagerial Work. New York: Harper & Row, 1973. Mintzberg, H. The Structuring of Organizations. Englewood Cliffs, NJ: Prentice-Hall, 1979. Mukhopadhyay, T.; S. Kekre; and S. Kalathur. "Business Value of Infonnation Technology: A Study of Electronic Data Interchange," MIS Quarterly. 19, no. 2 (June 1995), pp. 1 37-156. Nadler, D.; and M. Tushman. Strategic Organization Design. New York: HarperCollins, 1988. Naumann, J.; and M. Jenkins. "Prototyping: The New Paradigm for Systems Development," MIS Quarterly. 6, no. 3 (September 1982), pp. 29-44. Nelson, R. End-User Computing: Concepts, Issues and Applications. New York: Wiley, 1989. Nielsen, J. Hypertext and Hypermedia. New York: Academic Press, 1990. Nolan, R. "Managing Information Systems by Committee," Harvard Business Review. (July-August 1982), pp. 72-79. Nonaka, I. "A Dynamic Theory of Organizational Knowledge Creation," Organizational Science. 5, no. 1 (1994), pp. 1 4-37. Orlikowski, W., "Improvising Organizational Transformation Over Time: A Situated Change Perspective," Information Systems Research. 7, no. 1 (March 1996), pp. 63-92. Panko, R. "Is Office Productivity Stagnant?" MIS Quarterly. 1 5 , no. 2 (June 1 99 1 ), pp. 19 1-203 . Parsons, G. "Infonnation Technology: A New Competitive Weapon," Sloan Management Review. (Fall 1983), pp. 3-14. Porter, M.; and Millar, V., "How Infonnation Gives You a Competitive Advantage," Har vard Business Review. (July-August, 1985), pp. 149-160. Pounds, W. F. "The Process of Problem Finding," The Industrial Management Review. 1 1 , no. 1 (Fall 1969), pp. 1-20. Quinn, J.; J. Baruch; and P. Paquette. "Technology in Services," Scientific American. 257, no. 6 (December 1987), pp. 50-58. Rob, P. ; and C. Coronel. Database Systems: Design, Implementation and Management. Belmont, CA: Wadsworth, 1993 . Roche, E. Managing Information Technology in Multinational Corporations. New York: Macmillan, 1992. Rockart, J. "The Line Takes the Leadership-IS Management in a Wired Society," SMR Forum, Sloan Management Review. 29, no. 4 (Summer 1988), pp. 57-64. Rockness, H.; and R. Zmud. Information Technology Management: Evolving Managerial Roles. Morristown, NJ: Financial Executives Research Foundation, 1989. Ronen, B.; M. Palley; and H. C. Lucas, Jr. "Spreadsheet Analysis and Design," Communi cations of the ACM. 32, no. 1 (January 1989), pp. 84--93. Row, S. Business Telecommunications. Chicago: SRA, 1988. Scott Morton, M. S., Management Decision Systems. Boston: Harvard University, Gradu ate School of Business Administration, Division of Research, 1 97 1 . Short, J.; and N . Venkatraman. "Beyond Business Process Redesign: Redefining Baxter's Business Network," Sloan Management Review. (Fall 1992). Simon, H. The Shape of Automation for Men and Management. New York: Harper & Row, 1 965. Simons, R.; and C. Bartlett. "Asea Brown Boveri." Boston: Harvard Business School Case, 1992.
71 7
71 8
BIBLIOGRAPHY
Sinha, A. "Client-Server Computing," Communications of the ACM. 35, no. 7 (July 1992), pp. 77-98. Slade, S. "An Interpersonal Model of Goal-Based Decision Making." Ph.D. diss., Yale University, 1992. Smith, B . C.; 1. Leimkuhler; and R. Darrow. "Yield Management at American Airlines," Inteifaces. 22, no. 1 (January-February 1992), pp. 8-3 1 . Sprague, R.; and E . Carlson. Building Effective Decision Support Systems. Englewood Cliffs, NJ: Prentice-Hall, 1982. Stallings, W. "Local Networks," Computing Surveys. 16, no. 1 (March 1984), pp. 3--42. Stallings, W. Business Data Communications. New York: Macmillan, 1990. Steinbart, P. ; and R. Nath. "Problems and Issues in the Management of International Data Communications Networks: The Experiences of American Companies," MIS Quar terly. 16, no. 1 (March 1992), pp. 55-76. Stohr, E.; and B. Konsynski (eds.). Information Systems and Decision Processes. Los Alamitos, Calif.: IEEE Computer Society Press, 1992. Strassman, P.; P. Berger; E. B. Swanson; C. Kriebel; and R. Kauffman. Measuring Busi ness Value ofInformation Technologies. Washington, DC: ITIC Press, 1988. Straub, D. "The Effects of Culture on IT Diffusion: E-Mail and FAX in Japan and the U.S.," ISR. 5, no. 1 (March 1994), pp. 23--47. Swanson, E. B. Information System Implementation. Homewood, IL: Irwin, 1988. Taylor, W. "The Logic of Global Business: An Interview with ABB ' s Percy Barnevik," Harvard Business Review. (March-April 1991), pp. 9 1-105. Teece, D., "Profiting from Technological Innovation: Implications for Integration, Collab oration, Licensing, and Public Policy," in Teece, D. ed., The Competitive Challenge. New York: Harper & Row, 1987. Teo, H; B. Tan; and K. K. Wei, "Organizational Transformation Using Electronic Data In terchange: The Case of TradeNet in Singapore," JMIS. 1 3 , no. 4 (Spring 1 994), pp. 1 39-165. Tung, L. L.; and E. Turban, "Port of Singapore Authority: Using AI Technology for Strate gic Positioning," in Boon Siong, N. (ed.), Exploiting Information Technology for Busi ness Competitiveness. Singapore: Addison-Wesley, 1996. Turban, Efraim. Decision Support and Expert Systems. 4th ed. New York: Macmillan, 1995. Varshney, u., "Networking Support for Mobile Computing," Communications of AIS. 1, 1999 (http://www.cais.aisnet.org) Walton, R. Up and Running. Boston: Harvard Business School Press, 1989. Weber, R. EDP Information Systems Control and Audit. Upper Saddle River, NJ: Prentice Hall, 1999. Womack, J.; D. Jones; and D. Roos. The Machine That Changed the World: The Story of Lean Production. New York: Harper Perennial, 1990. Yourdon, E.; K. Whitehead; J. Thomann; K. Oppel; and P. Nevermann. Mainstream Objects: An Analysis and Design Approach for Business. Upper Saddle River, NJ: Prentice-Hall, 1 995. Zahedi, F. Intelligent Systems for Business: Expert Systems with Neural Networks. Bel mont, CA: Wadsworth, 1993.
Ii Page 8
"A System and a Disaster," The Wall Street Journal, December 12, 1997
Page 9
"A Virtual Manufacturing Company," The Wall Street Journal, August 1 8, 1998
Page 38
"Expanding Your Charter," Ihe Wall Street Journal, June 2, 1998
Page 32
"High-Tech Mortgages," The Wall Street Journal, August 2 1 , 1998
Page 5 1
"Vanity Fair's Technology," Business Week, September 25, 1 995
Page 91
"A Town for Telecommuters," The Wall Street Journal, June 19, 1995
Page 63
"Physical or Electronic Banks?," The Wall Street Journal, May 27, 1998
Page 92
"Just-in-Sequence at Mercedes Benz," ComputerWorld, November 17, 1997
Page 109
"Reducing Design Cycle Time," New York Times, March 3 1 , 1997
Page 100
"JIT II-Suppliers in Your Office," The Wall Street Journal, January 13, 1995
Page 121
"Making a Strategic IT Transition," New York Times, October 5, 1998
Page 134
"Designing Around the World," ComputerWorld, March 8, 1999
Page 1 3 1
Page 137 Page 145 Page 1 7 1
"Bringing a Global Organization Together," PC Week, January 26, 1998 "Worldwide Access," ComputerWorld, October 6, 1997
"The Global Reach of the Computer," The Wall Street Journal, June 29, 1995
"Where Else Would You Use a Chip?" Business Week, August 14, 1995
Page 175
"Recognizing Voices," PC Week, June 22, 1998; ComputerWorld, July 1 3 , 1998;
Page 1 87
"Breaking the Teraflops Speed Limit," Computer, February 1997
Page 206
"Java in Action," The Wall Street Journal, March 24, 1998
Page 199
Page 245 Page 247
New York Times, June 21, 1998
"Programs Have Bugs," New York Times, August 14, 1995
"What Is 64 Bits Worth?" Byte, July 1 995
"Billions, Even Trillions of Bytes of Data," Business Week, July 3 1 , 1995
Page 248
"NASD Data Warehouse," PC Week, November 24, 1 997
Page 251
"A Lot of Data about You," International Herald Tribune, March 9, 1998
Page 250 Page 272
"Virtual Databases," Internet Computing, July-August 1998
"Harvesting by Satellite," The Wall Street Journal, July 1 1 , 1996
Page 275
"Volvo to Use Network to Increase Market Share," ComputerWorld, December 1 , 1997
Page 279
"Substituting Electronic Communication for Travel," The Wall Street Journal,
Page 283
"A Data Pipeline at Amoco," Data Communications, April 1995
Page 277
Page 295
"What Does Speed Really Mean?" Byte, September 1995 December 4, 1 997
"More than a Phone Call," The Wall Street Journal, 1995
Page 298
"No Branches for 500,000 Customers," New York Times, September 3, 1995
Page 307
"Agents on the Network," IEEE Spectrum, August 1995
Page 303
Page 3 1 0 Page 3 1 1
"The Origins of the Web," Robert Lucky, e-mail: [email protected] "Combining a Lot of Components," PC Week, January 12, 1998
"The Internet versus the Government," Business Week, August 2 1 , 1995
Page 3 1 7
"Can Anyone Make Money on the Net?" Internet Computing, November-December
Page 321
Dell
1 997
1998 Annual Report
71 9
720
SOURCES FOR APPLICATIONS BRIEFS
Page 335
Page 341
Page 348 Page 349
Page 357 Page 362
Page 365
Page 3 8 1
"Networks at FedEx," Senn, Communications of the ACM, July 1998
"Different Approaches to Service," The Wall Street Journal, December 3, 1997
"Fast Response Jeans," PC Week, December 19, 1994
"Customer Service at Corporate Express," Intranet, November 1997
"How about Wearing Your Computer?" Corporate Computing, 1992
"Bargaining for Your Car in Cyberspace," The Wall Street Journal, December 30, 1997
"Transforming Knowledge from One Industry to Another," ORiMS Today, June 1997 "A Discouraging Failure Rate," The Standish Group Web pages: http://www.standish group.com
Page 385 Page 4 1 5
"A Different Model for Buying a Car," ComputerWorld, July 27, 1998
"High-Tech Airport Woes," The Wall Street Journal, July 13, 1998
Page 434
"IT Mismanagement Sinks a Brokerage Firm," The Wall Street Journal, January 26,
Page 473
"A Competitive Advantage through Micromarketing," The Wall Street Journal, May 3 1 ,
Page 479
"Computers Under the Hood," New York Times, June 19, 1998
Page 483
Page 498
Page 509
1998
1995
"A Package that Doesn't Fly," The Wall Street Journal, October 19, 1998
"Almost Reengineering," The Wall Street Journal, March 20, 1996
"Kinder, Gentler Tax Collection," New York Times, August 22, 1998
Page 522
"On the Future of Tall Building s , " William Mitchell, Scientific Ame rican,
Page 538
"A Challenging Implementation Problem," The Wall Street Journal, August 22, 1998
Page 552 Page 561 Page 565
Page 577
Page 580 Page 5 8 1
Page 584
Page 596
Page 6 1 7 Page 621
December 1997
"Helping an Unusual Group of Users," New York Times, July 2 1 , 1997
"Chrysler Provides Data to Help Suppliers Make Decisions," ComputerWorld, July 1 3 , 1998
"Operations Research Helps Taco Bell," Inteifaces, January-February 1998
"Notes on the Net," Michael Zisman, Lotus Notes Home Page, December 14, 1995
"Notes versus the Web," Web Week, September 1995
"Moving the Money," Zaheer and Zaheer, Management Science, November 1997 "A National Multimedia Effort," http://www.jaring.my/kkellas/cyber/cyber.htm "Are the Markets Efficient?" New York Times, September 1 1 , 1995 "Case-Based Reasoning for an Online Catalog," IEEE Internet Computing, July August 1998
"An Intelligent Advisor," Info World, August 3, 1998
Page 632
"Taurus-The Project that Couldn't," Economic and Social Research Council Paper 33,
Page 636
"Control in the Air," New York Times, August 20, 1995
March 1995 by W. Dutton, D. MacKenzie, S. Shapiro, and M. Peltu: London
Page 644
"Controlling Financial Risk," New York Times, September 27, 1995; ComputerWorld,
Page 646
"Robbing Citicorp (Now Citigroup)," The Wall Street Journal, September 1 2, 1 995
Page 653
Page 658
Page 668
Page 682
Page 683
Page 684
October 3 , 1 994
"A Job and a Career," ComputerWorld, June 1995
"Bad Trips," The Wall Street Journal, October 20, 1994
"A New Way to Manage the Supply Chain," PC Week, September 1 5, 1997
"Sharing Medical Knowledge and Alerts," Data Communications, October 2 1 , 1998
"Automating Automobile Design," IEEE Spectrum, November 1997
"Your Toaster on the Web," WebWeek, July 7, 1997; Business Week, June 24, 1 996
Page 689
"The Modem Detective," New York Times, September 15, 1997
Page 696
"Do You Want to Vote on the Web?" New York Times, September 17, 1998
Page 694
"Filling Your Tank with RAM," New York Times, August 27, 1998
I ABACUS, 140 ABB. See Asea Brown Boveri ABC television, 586 Accelerated Strategic Computing Initiative (DOE), 187 Access (program), 229, 236, 240, 474, 550 Access time, 231 Accounts receivable, 12, 398-399 Accuracy, 30 Acxiom, 251 Adaptive organization, 39 Address generator, 166 Addresses, 162-163, 231 ADSL (asymmetrical subscriber digital line), 278 AESOP expert system, 598, 600, 605-610 Agent, 307 AI. See Artificial intelligence Air Products and Chemicals (APC), 566--568 Air Traffic Control (ATC), 61, 636 Airline industry computerized reservation systems (CRS), 49, 57, 62-63, 338-340, 344 co-opting the travel agent, 80-82 deregulation and innovation, 1 14-115 discount seats, 563 E-tickets, 8 1 frequent flyer programs, 120 mainframe use, 184 organizational flexibility and, 79 overbooking, 562 reservation systems, 79-82, 338-340 traffic management, 563-564 yield management, 562 AIX, 222 Algorithm, 618 Allegiance, 105, 1 14, 297 Alliances, 15, 1 19, 121-122 joint ventures, 67 partnerships, 15 Alternatives. See also Decision making identifying, 35 information systems design, 421 selecting, 421 ALU. See Arithmetic-logic unit Amazon.com, 322-323 Amdahl, 354
America Online, 156, 296--299, 318 American Airlines, 57, 1 13, 297, 315, 338-340 decision-support system (example of), 562-566 reservation system. See SABRE system web server middleware, 214 wireless technology, 273 yield management, 562 American Express, 330, 600 American Hospital Supply/Baxter Health Care, 64, 1 14 American National Standards Institute (ANSI), 239, 282 American Standard Code for Information Interchange (ASCII), 260 American Stock Exchange (AMEX), 332, 598, 600, 605-610 Amplitude, 262 Analog Devices, 617 Analog signals, 262, 264 Analog transmission, 266 Analog wave, 262-263 Analytic decision maker, 28 Anarchy, 651 Andersen Consulting, 32, 105, 354, 555, 579-580 ANSI. See American National Standards Institute ANSI X. 12, 91, 282, 285, 296--297 ANSI X.25, 275 Anthony, R., 47-48 Apollo, 81, 1 14, 1 1 6 Apple Computer, 184, 188, 221 Applets, 205, 209 Application development, 4. See also Architecture; Systems design global firms and cultural differences, 132 high-level design tools and, 472 packages for. See Packages process, 472 users and, 550-553 Applications, 16, 18, 198 business, 200 computer. See Computer applications custom, 354, 355, 358 database management systems, 241-243 developing. See Application development
developmental risks, 470 on Internet, 305-306 outsourcing, 362-363 packages. See Packages proprietary, 358 purchase decisions and, 354-357 telecommunications, 260 Applications specific integrated chip (ASIC), 171 Applied artificial intelligence (AI), 595-596 Architecture, 57 characteristics of, 330 client-server architecture, 57, 335-337 communications. See Communications architecture computer. See Computer architecture data storage problem and, 348 examples of, 338-346 flexibility and, 329 hardware and, 329-330, 347 information systems. See Information technology (IT), design variables LAN and information sharing, 334 mainframes, 330-332 matching design to, 346 midrange system, 332 open systems, 337 o f organization. See Organizational structure personal computers and, 332-335 software and, 329-330 standards, 338 trends in, 348-349 types of, 331 Arithmetic, 160-162, 165 floating point, 170 Arithmetic-logic unit (ALU), 166 Arpanet, 302, 305 Artificial intelligence (AI), 84, 547, 595, 614. See also Expert systems; Neural network Artificial Intelligence Innovation Award, 612 AS/400 system, 188, 203 ASCII. See American Standard Code for Information Interchange
Asea Brown Boveri (ABB), 139-140 ASIC. See Applications specific integrated chip Assembly language, 198-200 Association for Computing Machinery (ACM), 174, 691 Association for Information Systems (AIS), 324 Asymmetrical subscriber digital line (ADSL), 278 Asynchronous transfer mode (ATM), 277, 278, 283 Asynchronous transmission, 261 AT&T, 141, 273, 275 , 332 Internet access, 304 Unix, 222 virtnal organization, 88 AT&T Worldnet, 296 ATC. See Air Traffic Control ATM. See Asynchronous Transfer. Mode; Automatic teller machine Attenuation, 267 Auction, 306, 3 1 5 Audit trail, 430 Auditing, information systems and, 641 Authorizer's Assistant, 600 Auto-by-tel, 316, 323, 362, 385 Automatic tener machine (ATM), 63-64 Automation. See Production automation Automobile industry, 66-68 Avis, 36
Baan, 250, 370, 655 Back propagation, 616 Back-office functions, 82-83 Backup, 642 Backward chaining, 598 Bacteria, 645-646 Bandwidth, 264 Bank of America, 247 Bank of England, 632 Bank of New York, 637 Bar codes, 97, 173, 357, 428 Barings Bank, 644 Barnevik, Percy, 139 Base (numbers), 160-161 BASIC, 200 Batch monitor, 215-216 Batch programs, 1 84 Batch system, 55 Baud, 264
721
722
I NDEX
Baxter Health Care, 1 14 Baxter International, 64 Baxter Laboratories, 105 BCD (binary coded decimal), 260 Bell Labs, 203, 222, 278 Benchmark, 355 Bidding, electronic, 306, 3 1 5 Big Bang (in London), 83 Binary system, 161-162 BIOS (basic input-output system), 221 Bits (binary digits), 162 Black-Scholes options pricing model, 606-607 Block mode, 261 Boehm, Barry, 393 Boeing, 108-109 Boston Market, 578 Bridge, 268 Broker workstation, 342-344 Browsers, 306, 309-3 1 1 Brun Passot, 5, 10-1 1, 18, 64, 105, 301 Budget, 632 Budgetary control, 642 Bulletin boards, 86, 305 Bureaucracy, 38, 84-85, 92 Burlington Northern, 419 Burr, Donald, 80 Burroughs, 184 Bus, 159, 165 Business, international. See Globalization; International business Business process redesign, 497 Byte, 162, 264 Bytecode, 209
C language, 203-206, 212, 347, 401, 472 Cable modem, 278 Cable television, 586 Cache, 167, 172 Cache memory, 171 Caching, 167 Calyx and Corolla, 88-90, 95-96, 108 Capacitor, 163 Capital, 15 Cardinal Health Care, 105, 1 14 Carrier sense-multiple access with collision detection (CSMAlCD), 270 CAS. See Computer-aided design CASE. See Computer-aided software engineering Case-based reasoning (CBR), 595, 617-618, 621 Cash flow, 10 Cash management account (CMA), 106 Cathay Pacific Airline, 3 15 CBR. See Case-based reasoning CD-ROM, 160 CDnow, 621 Celeron chip, 171 Cellular communications, 84, 272, 274
Cellular digital packet data (CDPD), 272 Central processing unit (CPU), 159, 164 chip performance factors, 169-170 CISC vs, RISC, 1 67-169 classes of instructions (examples of), 168 how works, 1 65-167 model of, 166 CEO. See Chief Executive Officer Chained files, 234 Champion, 387, 527 Change. See also Organizational change; Reengineering business environment, 90, 695 effect of, 50 emergent change, 532-533 hierarchy of, 5 1 9 legacy systems and, 184 sponsorship of, 387 Character, 229 Character coding, 163 Character mode, 261 Character recognition, 503 Charismatic organization, 39 Charles Schwab, 83, 175 Chase Manhattan Bank, 63, 578-579 Chat rooms, 5 8 1 Chek Lap Kok Airport (Hong Kong), 415 Chevron Canada, 344 Chiat-Day, 88 Chicago Board of Trade, 538 Chief Executive Officer, survey results, 65 1 Chief Information Officer (CIO), 652-655 added value of, 655 packages and, 484 vision and plan, 656-658 Chips. See Semiconductor technology Choice stage, 35, 48 Chrysler Corporation, 47, 561, 662, 683 electronic data interchange system, 297 Intranet and, 310 mainframe use, 184 Pay-as-Built program, 67, 633 technology and reengineering, 66-68, 109 Cicso Systems, 317-318 cra. See Chief Information Officer CISCo See Complex instruction set computer Cisco Systems, 668 Citibank, 121 Citicorp, 646 Class, 401 Client-server architecture, 57, 189, 192, 425 critical control areas, 639-640 networks and, 334-337, 344-347
Clock speed, 158, 167, 169-170 CMOS processor, 186, 349 COBOL, 192, 200-202, 472 Code, 260 Code cache, 165 Cognitive style, 26, 28 Command and control system, 57 CommerceNet, 297, 314, 3 1 8 Commercial network providers, 298-299 Commitment stage, 530 Committees, selection, 387 Common carriers, 298-299 Communications, 14, 53, 84, 143, 156. See also Communications networks; Data communications; Networks common carriers, 277-279 computers as tools for, 18, 260-266, 295 contributions of, 281-282 control of, 281 with customers. See Customers electronic. See Electronic data interchange; Electronic mail employees, 12 global, 128, 132 government-owned facilities, 1 32 impact of, 296 information technology'S role in, 10 as key technology, 53 service providers, 274-275, 359 system of, 55-57 technological changes and, 259-260 wireless technology and, 272-274 Communications architecture, 266 Communications infrastructure, 296-298 Communications networks, 132 advantages for business, 274-275 architecture, 268-270 packet switching. See Packet switching private, 275 transmission speeds, 277 voice considerations, 274 Communications-oriented system, 55 Compaq Computer, 88, 184, 322, 354, 430, 578 Compatibility, 555 Competitive advantage, 73, 80, 90, 105 creating and sustaining, 1 12-1 14 defined, 105 first mover advantage, 1 1 3 information technOlogy use for, 1 1 1-1 1 3 protecting IT innovation, 1 1 3-114 Rosenbluth Travel (as example), 1 14-1 1 6
switching costs and, 1 14 technological leadership and, 105, 1 1 3- 1 1 4 using resources, 1 1 2- 1 1 3 Competitive strategy global competition and, 108-109 integrating technology and, 1 16-1 1 8 Compiler, 205-206 Complementary assets (resources), 1 1 3 Complex instruction set computer (CISC), 1 67-169 Compression, 263, 586 Compuserve, 298 Computation, 169 Computer, 7. See also Personal computers acquisition decision, 364-366 arithmetic basis of, 160-161 basics of, 158 bus, 159 central processing unit (CPU), 159 diskette drive, 160 instruction set and, 167 mainframes and, 183-188 Computer applications mainframes, 1 84-187 personal digital assistants, 190-191 supercomputers, 190 Computer architecture, 1 1 8, 163. See also Client-server architecture; Hardware; Software choice of, 183-184 elements of, 329-330 proprietary, 184 Computer Associates, 354 Computer consulting industry, 354 Computer design, human element and, 158 Computer hardware, 158 Computer industry, 354 Computer networks. See Networks Computer programs. See Applications; Operating system; Packages; Software Computer Sciences Corporation, 362, 662 Computer teChnology, global reach of, 145. See also Global information technology Computer technology management. See Management Computer-aided design (CAD), 134, 285 Computer-aided software engineering (CASE), 430-43 1 , 637 Computerized reservation systems (CRSs), 80-82, 1 15, 338-340, 344. See also SABRE system
INDEX
Computers, 84, See also Hardware; Personal computers
arithmetic basis of, 160, 165 business uses of, 15
organizational change, 535-537
protocols, 265-266
process of, 34, 35-38
outsourcing and, 660
simplex transmission, 261
programmed decisions, 47-48
T-Form organization, 534-535
synchronous mode, 261
semistructured decisions, 48
transmission modes, 261
Slade model, 35-37
Costs
as communications tool, 12, 18, 295 cost/performance ratio,
computer functions, 183
structured decisions, 48
Data cube, 247
technical issues and, 155
electronic data
Data encryption, 281
types of decisions, 34-35, 47
interchange, 297
guide to, 185
transmission speed, 264-265
computers, 184
183-185, 189 design features, 158
Internet, 303
Data flow barriers, 133 Data flow diagrams (DFD),
reengineering, 494
396-397
unstructured decisions, 48 Decision-oriented frameworks, 47-48
CPU. See Central processing unit
Data mining, 247, 249
Cray Research, 187
Data modeling, 241-242
mainframes, 1 84-186
Credit cards, 52, 330
Data path, 169
data-oriented, 560
Critical path method (CPM), 637
Data warehouse, 34, 52, 95, 156,
design of, 560-561
netsurfing, 309
Cross-functional teams, 141
network PC, 185, 189, 308
Crossover, 620
purchasing, 158
CRSs.
how CPU works, 165-167 linkage,
See Networks
memory. See Memory
the server. See Servers
723
See Computerized
246-248, 553 Database, 26, 52-53, 550 in information systems
reservation systems
design, 247
Decision-support systems (DSS), 52, 55, 547, 560
examples of, 562-568 executive information systems (EIS), 568-570 group decision-support
speed, 158, 170-- 1 72
CRT (cathode-ray tube), 158
proprietary, 359
supercomputers, 187
CSMAlCD protocol (carrier sense
relational, 235
model-based, 560
size, 330
technology-assisted meetings,
wearable, 357
multiple access with
Concentrator, 268
collision detection), 270
Constitutional monarchy, 652
CUsee me, 87
(DBA), 244
Consultants, 359
Cultural differences, 132
Continental Airlines, 1 3 1
Currency risk, 129
Continuous innovation, 1 14
Customer driven strategy, 108 Customer services, 108, 129
Control theory, 630--6 31
Customer services department (CSD), 532-533
Control variables, 86
Customers, electronic links with,
Controlling function, 1 1 8, 554, 689.
See also Management
control
14-15, 86, 97,
Database management systems (DBMSs), 229, 234-235,
Control mechanisms, 86 Control unit, 165
Database administrator
III
electronic data interchange
472-473 changing markets for, 250
global business, 128
Conversion effectiveness, 433
571-572 Dedicated applications package, 366-367, 474, 478-479 establishing criteria for, 368-370 implementation and, 478-479
file elements, 229-234
Deduction, 30
finding data and, 232-234
Defense, 681
as key technology, 53
Dell Computers, 270, 3 1 4-3 15,
knowledge discovery and, 614 object-oriented databases,
(EDI), 282-283
Conversion, 384, 387
systems (GDSS), 570--5 71
240--241 Oracle's enterprise DBMS,
JIT inventory, 67
245-246
317, 321-322, 354 Delta Airlines, 8 1 Demodulation, 262 Demographics, 524 Dendrite, 615
Coopers & Lybrand, 578
Cyberspace, 309
relational database, 235-237
Department of Defense, 271
Coordination, 77, 90
Cyberwar, 681
software for, 234-235
Department of Energy, 187
Cycle time, 108-109
storage media, 230
Department of Transportation, 676
Structure Query Language
Design.
in international business, 130, 1 34-137 Corporate Express, 349 Corporate information services department, 332, 553, 655 Corporate strategic plan, 120--1 21.
See also
Organizational strategy
IT initiatives and,
122
systems development, 122
Corporate strategy, 18.
See also
(SQL) and, 239-240 Dana Corp., 284
systems design and, 241-25 1 , 555
Dassault Systems, 109 Data, 1 1 , 229. Files
See also Database;
Database systems design data mining, 249
accessibility, 30
data modeling, 241-242
as control issue, 642
data warehouse and, 246-248
See also Architecture;
Systems design
in decision making, 3 1 , 47-48 methods, 395 object-oriented.
See Object-
oriented design
organizational design.
See
Organizational design
format, 297
distributed databases, 246
top-down, 396
multinational flow of, 132-133
role of database administrator
user-oriented, 391-392 variables.
See Design
Competitive advantage;
normalization, 238-240
Organizational strategy
sources of, 12
Day trading, 680
customer driven strategy, 108
storage problem and, 348
DB2, 239
technology (IT), design
differentiation, 108
uniformity in, 136-137
DBA.
variables
(DBA), 244
See Database administrator
variables; Information
Design architecture, scope of,
generic strategies, 108
Data cache, 165
DBase, 229
global competition, 108-109
Data channel, 186
Dean Witter, 123
information systems strategic
Data collection, 394-395, 428
Debugging, 199, 2 1 7
Design cycle time, 109
Decentralization, 142
Design stage, 35, 48, 384, 530
grid and, 109-1 1 1 information technology, 105-107 low-cost producer, 108
interviews, 394 observation, 394 questionnaires, 394-395 Data communications, 260
market niche strategy, 108
analog signals, 262-263
quality management, 109
asynchronous
reduced cycle times, 108
transmission, 261
right-sizing, 109
block mode, 261
value chain and, 107-108
character mode, 261
Cost avoidance, 61
digital signals, 263-264
Cost reduction, 90, 1 1 9-120
direction of transmission,
Costlbenefit analysis, 416-418,
521. See also Investment Opportunities Matrix
implementation and, 521, 527, 530
261-262 full duplex transmission, 262 half duplex transmission, 261 ISO standards, 266
networks and, 303 Decision making, 14 decision-oriented frameworks, 47-48 evaluation of packages, 481-482 information technology management and, 120 interpreting information and, 29-30 nonprogrammed decisions, 47-48 organizational structure and, 38-39
329-330
Design task, 380 Design teams, 392, 527
Design variables, 84-86. See also Information technology
(IT), design variables
communications, 85-86
conventional types, 84-85 interorganizational relations, 85-86 structural, 84-85 work process, 85-86 Detail, 30 Developing countries, Internet and, 149
724
INDEX
Developmental risks, 470-471 Device manager, 221 Differentiation, 108 Digital convergence, 586--588 Digital Equipment Corporation (DEC), 184, 188, 28 1, 354, 537 Digital signals, 263-264
Electronic coordination, options for, 580--5 81 Electronic customer-supplier relationships, 86, 128 Electronic data interchange (EDI), 86, 99, 260
of performance, 364
Field, 229
of software, 354
Files, 55, 57, 229
techniques, 364 of vendors, 364
accessing, 229-232 chained, 234
Evolutionary computations, 618
defined, 229
Excel, 473, 478
elements, 229
advantages of, 297
Execute cycle (phase), 167
finding data on, 232
compatibility problems, 282
Executive information systems
relational, 235
Digital Xpress, 141
cost savings from, 68, 297
Direct access files, 230, 232
customers links, 14-- 1 5, 67,
(EIS), 52, 568-570, 633 Executive program, 215
structure of, 232-234 types, 230
Expectations, 482
Financial institutions, 106
DirecTV, 586
defined, 296--297
Expected value, 664
Fire wall security, 281
Discover card, 141
lean production and, 67, 90
Expert systems (ESs), 52, 497,
Discrepancies, 482
required use, 9 1
Direct manipulation, 176
Disk, 160 Disk file, 187 Diskette drive, 160 Distributed client-server system,
97, 1 1 1 , 282-283
standards and, 281-282 Electronic Data Systems (EDS), 354, 362, 662 Electronic economy, 287
Firmware, 504 First Direct Bank, 298
503, 507 applied artificial intelligence (AI), 595-596 case-based reasoning (CBR), 617--618, 621
First mover advantage, 1 1 3 Fitness function, 6 1 8 Fixed-point number, 165 Flexibility, 73, 75-76, 78
Hardserve case study,
Electronic links, 84, 97, 128
components of, 597
defined, 78-79
441-459
Electronic mail, 53, 55, 132, 260
examples of, 599--6 1 3
transnational strategy, 130
Distributed databases, 246 Disturbance handling, 34 Division of labor, 76
as communication tool, 12-13, 99, 281-282 IT-enabled organizations, 84,
genetic algorithms, 618--620
Floating-point arithmetic, 170
inference engine, 597-598
Floating-point unit, 166
intelligent agents, 620--62 1
Floppy disks, 160
knowledge discovery, 614
FOCUS, 212, 472
Downsizing, 50
in Japan, 132
knowledge representation, 597
Food and Drug Administration
Drill down, 569
wireless transntission, 275
neural networks, 6 14--6 1 7
Documentation, 368, 483
Dumb terntinal, 173
86, 95, 97
Electronic markets, 285 Electronic securities markets, 83,
EasySabre, 340--3 41
Electronic shoppers, 90
EBCDIC, 260
Electronic work flows, 86,
Econonties of scale, 129, 132 ECR.
See Efficient Customer Response
508, 5 1 3 E-mail.
Force fields, 538
user interface and, 597
Ford Motor Company, 134,
Explicit knowledge, 32-33
679--680
See Electronic mail
Exploration, 530 External information system, 30 EZ Pass, 62
FORTRAN, 200 Forward chaining, 598
Embedded products, 16
Fourth-generation languages
ED!.
Emerging markets, 128, 145
Face-to-face communications, 143
Employees
Facilitator, 571
EDIFACT, 296 Editing, 57 EDS.
See Electronic Data Systems
decision-making initiative, resistance to change, 5 1 9
Fact cube, 247
supervision of, 13, 88, 97, 680
Factory setting,
I I0
Efficiency, 16, 147
Employment, 685
Fail-safe operations, 332
Efficient capital markets
Encapsulation, 401
Fannie Mae, 32-33
hypothesis, 596
Encryption, 281, 640, 686
Fault tolerance, 332, 430
Efficient customer response
End-user computing, 550
Fax, 84, 86
Enhancements, 386
Feasibility study, 383
(ECR), 100
EIS.
See Executive Information Systems
EISA (Extended Industry
Enterprise servers, 189 Enterprise software, 250, 370,
Frame, 597 Frame relay, 276 Frameworks decision-oriented frameworks, 47-48 Gorry-Scott Morton framework, 48-49, 53 information technology-based, 47-54
content and format, 420
Leavitt model, 49-50
costlbenefits analysis, 416-418
organizations and decisions,
organizational impact, 419
479-480
(4GLs), 197, 199, 210--2 12, 472
Facilities management services, 362
97-98
Act, 638 Formal organization, 76
Emergent change, 532-533
interchange
283-285 Foreign Corrupt Practices
Extranet, 309-3 1 1 , 347, 550, 580
Eddie Bauer, 3 1 8
See Electronic data
(FDA), 138
systems deVelopment, 598
Standard
Enterprise systems, 495
packages and, 418-419
Architecture), 172
Entity-relationship (ER)
potential criteria, 421
49-51 synthesized model, 48-49 France Telecom, 136, 299, 302
diagram, 241
selection comntittee, 420-421
Fraud, 689
Electronic brokerage accounts, 324
Environmental change, 50
systems alternatives, 418-420
Freddie Mac, 32-33
Electronic bulletin boards, 86, 305
Equipment, strategies for
technological feasibility,
Free trade, 128
Electronic banking, 121
Electronic commerce (Ecommerce), 7, 18, 3 1 1-314, 362
acquiring, 363
419-420 Federal Express, 38, 88
Errors, 429-430 detection, 261
Frequency, 263 Frito-Lay, 37-38, 94, 96, 297-298
home page, 1 13, 3 1 3
From clause, 239
agents, 307
Ethernet, 270--271
Intranet and, 335
Fujitsu, 354
disintermediation and,
Ethics, 691--693.
network use, 297
Full duplex transntission, 262
320--321 hierarchy vs. market-based transactions, 320 management control and, 640--641 nature of markets and, 3 1 5-321 Electronic communication, 13, 85-87, 99. See also
Electronic mail
as substitute for travel, 279 Electronic conglomerate, 93
See also Social
responsibilities E-tickets, 8 1 E-TRADE, 83
Optintizer problem, 483 package tracking, 62-63, 344, 428
Euro, 128
Federal model, 652
European Econontic Community
Federal Privacy Act, 690
(EEC), 128 Evaluation.
See also Costlbenefit
analysis
Federal Trade Comntission, 143
Gateway, 354
GDSS. See Group decisionsupport systems
General Dynamics, 662
Feed-forward networks, 6 1 5
General Electric, 184
Fetch cycle (phase), 167
General Electric Information Services Co., 358
criteria, 421
Feudal model, 651
of hardware, 354
Fiber optics, 586, 588
General Motors, 91, 537
packages and, 481-482
Fidelity Investment Co., 434, 498
General Motors Europe, 578
INDEX
General Motors-Toyota joint ventnre, 67 Genetic algorithm, 595, 61 8--{i20
Henristic programs, 28, 595
interpreting, 1 1, 26-28
the manager and, 15-16, 183
Hewlett Packard, 141, 222, 274,
model for interpreting, 28-30
perceptions of, 654
282, 314, 354
Genie, 298
Hierarchical organization, 92
Geographical Position System
High-level languages, 200-210,
(GPS), 272 Gigabit Ethernet, 271, 275 Global information technology
472, 478
strategies for managing, 135 systems development skills, 135 three examples (case studies), 138-144 uniform data, 136-137 Global products, 129
time and space boundaries
Information services (IS), 332,
Host, 268 HTML.
See Hypertext Markup
Language HTTP.
characterization of, 329-330
See Hypertext Transfer
Protocol
Information superhighway, Information systems (IS)
Hypertext markup language
communications-oriented
(HTTP), 306
executive information systems expert systems, 52
Gorry-Scott Morton framework,
AS400, 203
generic types, 55
chips, 189
key components of, 381
database management
management control and,
176, 189, 221, 425-426 Windows, 221
systems, 229, 239-240
86-91 production automation, technological leveling, 85 technological matrixing, 86
(EIS), 52
airline reservations system, 80
Graphical user interfaces (GUIs),
electronic workflows, 86
85-86
defined, 26 537, 644
electronic communications, 86
examples of design use,
241-251 decision support systems (DSS), 34, 52, 55-56
IBM, 88, 90, 1 1 3, 162, 222, 354,
Information technology (IT),
electronic linking, 84
system, 55 databases in systems design,
Hypertext transfer protocol
vision and plan for, 656--{i58
design variables
auditing and, 641
(HTML), 205, 306, 577,
value chain and, 65-66, 108 the workplace and, 6-10, 522
299, 580
Hub, 270
588-590
and, 78 as transformational agent, 13-15, 64--{i5
655--{i56 Information sharing, 143
Gore, AI, 149 48-49, 53
57-58
Information processing, 123
Globalization, 128-130, 147 Goals, 76
return on investment and,
Historical information, 30
Global village, 148 competition and, 108-109
use by organization, 77
strategic application, 64
Honda, 122
communications and, 136
recent trends, 547
Information manager, 221
interorganizational
shared vs. local systems, 137
political model of, 651--{i52
sonrces of, 30
Highly parallel computers, 185 Horne pages, 1 17, 3 1 1
linkages, 135
relationship to data, 26-30
Information center, 332, 553, 655
infrastructnre for, 135-136
liberalized electronic
725
virtual components, 84 Information technology management, 3-4, 15-16, 1 1 8-119.
See also
Management
633-634
controlling function, 1 18
employee reduction, 109
purchase decision, 355
Graphics, 172, 189
mainframes, 1 84-186, 188
security issues and, 642--{i46
decision making and, 120
Greyhound Bus, 658-659
market value, 198
technology use, 55-57
globally competing firms,
Group decision-support systems
network-centric computing,
transactions processing
(GDSS), 16, 570-571 technology-assisted meetings, 571-572 Groups, 52-53 Groupware, 16, 52-53, 60, 84, 135, 547, 549, 560
337-338 parallel supercomputers, 190 personal computers and, 188-189
Information systems management
SQL and, 239-240
as coordination software, 573
Icons, 176
Lotus Notes example, 573-580
Identification, 35
information systems plan,
policy issues and, 73, 553-555 Information systems strategic
(IT)
options for, 580-581
Image scanning, 503
Information technology
organizational knowledge
Imaging device, 173
benefits of, 521
Immune System, 644
business environment
and, 572-580 GTE, I41 GUI.
See Graphical user interfaces
Implementation, 35, 478, 5 1 9
657--{i58 integrated global IT, 147
standards, 555 grid, 109-1 1 1
independent operations and, 145-146
data access, 555 mistakes and, 554
IBM of Canada, 550
145-147 headquarters driven, 146-147
system, 55-56
integration and, 1 1 6-1 1 8
intellectual synergy, 147 international issues, 134-137 issues of, 20 make or buy decision, 488-489 ongoing tasks, 123
definition of, 520-521
capital investment and, 662
organizational vision and, 1 19
design teams, 527
capitalizing on, 1 1 1- 1 1 2
outsonrcing strategy, 659--{i62
examples of, 530-532
change and, 16-17, 25-26, 47,
plan for technology, 1 1 8
Half duplex transmission, 261
factors for success, 521
Halo effect, 8 1
framework for, 527-530
communication and, 1 2
Hammer, Michael, 5 1 5
model of, 523-525
competitive advantage and, 105
definition of, 337-338
Harassment, 680-681
participation strategy,
contributions of, 7
global information technology
Hardserve case study, 441-459 Hardware, 158, 1 84, 354
526-527
64--{i5, 105, 533-535
corporate strategy and,
process of, 525
105-107
systems plan, 3-4 Infrastructure, 60--{;1, 122
and, 135-136 international infrastructure, 688
design-mandated, 358
research on, 522-523
definition of, 1 1-12
Inheritance, 402
evaluation of, 354
strategy for, 526-527
design variables and, 84
Initiation, 527
influence on IS design, 329
Incremental improvement, 494
environmental change and, 50
Inkjet printers, 176
internal vs. external sources,
Independent operations, 145-146
ethics and, 691--{i93
Innovation, 1 1 3
359-360
Indirect benefits, 62
flexibility and, 83
Input-only devices, 173-176
proprietary, 158, 184
Induction, 29
frameworks for, 47-51
Input-output devices, 172-177
purchase, 354, 359
Industry Standard Architecture
futnre with, 693--{i96
bar coding, 97, 173, 357, 429
groups and groupware, 52-53
imaging device, 173
scale of, 355
(ISA), I72
sonrces, 359
Inference engine, 597
vendors, 354
Informal organizations, 76
Hardware obsolescence, 366 Headquarters driven approach, 146-147
Information, 1 1 .
See also
implementing international IT, 131-133 interorganizational systems, 53
Information systems;
investment benefits, 417-418
Information technology
investment opportunities
Healthnet, 682
characteristics of, 30-31
Hertz, 36
defined, 26
matrix, 58-64 major trends of, 17-19
mouse, 176 optical character recognition, 174 pen-top personal computers, 174-175 scanners, 1 73-174 terminals and PCs, 173
726
INDEX
touch screeus, 176
Internet protocol
voice input, 175-176
271-272, 302
(!P),
JIT.
See Just-in-time inventory
JIT 11, 100
Local bus, 172 Logic bomb, 644-645
Input-output (I/O) processor, 160
Java programming and, 205
Join, 236
Logical record, 229-230
Inquiry system, 57
long-distance service and, 274
Joint applications design
Logical view, 243
(JAD), 432
London Design Museum, 590
Installation, 530
Lotus Notes strategy, 577
Instruction decoder, 166
as major change, 18, 25
Joint effort, 76
London Stock Exchange, 8, 83
Instruction location counter, 165
as network, 266
Just-in-time inventory (JIT), 47,
Lotus 1-2-3, 199, 478
network PC and, 185, 189, 308
Instruction set, 167 Integer unit, 166
network security, 280
Integrated global IT, 147
new business models and,
Integrated services digital
321-324
networks (ISDNs), 141, 277
origin of, 303
66-{i8, 92, 100, 1 14
Lotus Notes, 53, 60, 140, 532-533, 539 as groupware, 573-580
Kennametal Inc., 9, 17
Internet strategy, 577
Key, 229
Low-cost producer, 108
Integrated Systems solutions, 362
policy, 1 19
Knowledge base, 597
Lower CASE, 430
Integrating mechanisms, 77
search engines, 306-307
Knowledge, defined, 31
Lucent, 278-279
Integration, 20
service provider, 273, 302
Knowledge discovery, 249, 614
Integrator, 359
small firms and, 319
Knowledge engineer, 598
Intel, 77, 87, 105, 1 13, 122,
software for, 205, 209
Knowledge workers, 18, 32, 52
169, 308
standards, 214
benefits from, 556
chips, 184, 188, 189, 221
strategy for, 16
education of, 681
employee reqnirements, 683
TCP (transmission control
Intellectual property rights, 679
protocol), 302
Intellectual synergy, 147
telecommuters and, 91
Intelligence, 35, 48
users, 306-308
Intelligent agents, 620-621
voting and, 696
Intelligent systems, 547
web browsers, 306
Interactive processing systems, 57
Internet Explorer, 205, 214, 338
Interdependence, 77-78
Internet Protocol (IP),
Internal information sources, 30 Internal Revenue Service, 509
Internet service provider (ISP),
See also Global
information technology
coordination and, 130
273, 302 Intemist-1 expert system, 600-604
implementing international IT, 131-133, 145-147
support of, 553
McKesson Corporation, 357 Macromedia, 582
technology development and, 555 user activities and, 550-551 KornlFerry, 341
Ll caches, 167
legacy systems, 184
L. L. Bean, 315
proprietary hardware and, 184
Lamy, 301
Languages
Interpretation, 1 1
information needs, 130-131
Interrupts, 219
key issues in, 130-133
Intranets, 14, 57, 61, 86, 335, 550
fourth-generation (4GLs),
Make or buy decision, 488--489
197, 199, 210-212, 472 high-Ievel, 472 nonprocedural, 472 programming, 198, 401
transnational firnas, 130
global firms and, 130-131
Laser printers, 176
International infrastructure, 688
World Wide Web and, 580
Lawrence Livermore Laboratory,
Internet, 57, 86-87, 1 1 1 , 141, 347
Inversion, 620 Investigation services, 689 Investment Opportunities Matrix,
accessing, 91
58-60, 662-665
applicatious and information sources, 57, 305-306
187-188 Maintenance, 385
benefits of, 309-3 1 1 , 347
Organization (ISO), 266
software packages and, 480 supercomputers and,
computer, 197
multinational strategy, 130
International Standards
183-188, 347 batch programs and, 184 evolving role of, 348-349
Interorganizationa1 systems
Interpreter, 205, 209
Mainframe computers, 52, 162,
for high volume, 330-332
LAN. See Local area networks
(lOSs), 53, 1 1 1 , 287
Macros, 473 Magnetic disk, 230-23 1
Kolind, Lars, 5 1 0-511
Interorganizational linkages, 135
global strategy, 130
Communications, 273 Machine language, 198, 205
system design and, 552-553
271-272, 302
International business, 73, 687.
McCaw Cellular
188 Leadership
MAN.
See Metropolitan area
network Management action plan suggestions, 671-672 capital investment and, 662 CEO survey results, 651 corporate strategy, 671
CEO survey results, 651
data access, 555
as IT champion, 387, 527
decisiou making and, 35,
as competitive uecessity, 63-64
by systems analyst, 391
direct return, 62
technological, 1 14
665-669 executive iuformation systems (ElS) and, 568-570
auction markets and, 3 1 5
indirect returns, 62-63
cable modem and, 278
infrastructure, 60-61
client-server computing
strategic application, 64
Lean production, 47, 66-{i8, 100
information politics, 651-652
transformational IT, 64-65
Learning organization, 248
information systems strategic
and, 337 costs, 304
lOSs.
as data source, 34
See Interorganizational systems
vision and plan, 656-658 Lean organization, 534
Leavitt, Harold, 49-50 Legacy systems, 184
DBMS and, 250
Iridium, 272-273
Legislation, 689-670
digital library and, 174
IS.
Less-developed countries, 145
effect on personal computer use, 6-7, 309 electronic commerce and,
See Information systems ISA. See Industry Standard Architecture
ISDNs.
1 1 1 , 3 1 1-314, 324
See Integrated services
digital networks
See Information technology
Less-than-truckload (LTL) delivery, 68 Levi Strauss, 348
implemeuting change, 5 1 9
grid and, 109-112 information technology and, 15-16, 20 investment equation, 662-665 make or buy decision and, 354-360, 373
Linked list, 234
outsourcing, 362-363
Linking mechanisms, 84
policy issues, 553-555
in France, 302
IT.
as global communication tool,
IT investment equation, 662-665
Links, 588
role of, 572
IT-enabled organization forms, 95
Linux, 222-223
senior management's role, 6
Iterative approach, 560
Lithonia Lighting, firm
software applications and,
132-133 globalization and, 128 government regulation and,
reengineering, 5 1 2-514
3 1 1 , 675
See Joint applications design
Local area networks (LANs), 12,
growth of, 294, 296, 302-309
JAD.
imperialism and developing
Japanese auto industry, 66-{i7
ethernet, 270-27 1
countries, 149 as international infrastructure, 688
334, 347
Japanese management, 534-535
file server network, 269-270
Java, 205-210, 308
gigabit ethernet, 271
Javascript, 210
peer-to-peer network, 269
197-198 standards and, 555 summary of IT issues, 669 technological environment and, 183-184, 651 Management by walking around, 572
727
INDEX
Microsoft Network, 298
Management control auditing information systems, 641
Midrange computers, 185,
budgets and, 632
1 88-190, 332, 347
control theory, 630-631
acquisition, 364-366
electronic commerce and,
database systems for, 229
640-641
information systems design
failure of, 632-633
and, 329
financial risk and, 644-645 information systems and,
Million instructions per second (MIPS), 170, 184
issues of, 34, 48, 642
Minicomputer, 185,
operations control, 637-640
See also
steps for, 403 transactions sequence diagram, 404
Communications networks altematives for wide area communications, 275-278 commercial network providers, 298-299
Object-oriented programming, 203 Obliterating a process, 493, 499 Obsolescence, 366 Occupational Safety and Health Administration (OSHA), 6 1
configurations, 268-269
operating system, 220
633-634
Networks, 12-14, 18, 2 1 , 183, 189-190.
Middleware, 214
188-189, 332
ED! networks, 295-297 interconnections, 271
OCR.
See Optical character recognition
internal, 309-3 1 1
Off-line, 187
as key technology, 52-54
OLAP (on-line analytical
LANs. See Local area
processing), 247
See On-line transactions
outsourcing and, 661
Mining data, 52
reward structure and, 632
Minitel, 136, 139, 296, 299-302
management, 333-334
security issues and, 642-646
Mintzberg, Henry. 572
mass market, 296
On-line catalog, 617
systems development and,
MIPS.
national network
On-line systems, 216-217, 259
635-637
networks
See Million instructions
per second
tools of, 631-633
Misuse of information, 686
Managers
coordination task, 77. See also Management control
Mitsubishi, 141
infrastructure (Minitel system), 299-302
OLTP.
processing
On-line transactions processing (OLTP), 5 1 , 332
neural uetwork, 595, 614-617
Open system, 337
Mnemonics, 198
nodes, 271
Operating system, 198, 215
Models, 55
as organizational change
early systems, 215-216
information nse by, 1 1
Modem, 262
IS design role, 387-390
Modulated, 262
packet switching, 275-276
on-line systems, 216
Modules, 476
private networks, 279-280, 298
personal computers and,
Monarchy, 652
security, 280-281
Money market accounts, 106
servers, 268-269, 335-337
time-sharing and, 217-220 UNIX, 220, 222
IT decisions, 15-16, IT evaluation, 354
19
lean production, 67
agent, 295
resource allocation, 384-386
Monitor, 215
shared ATM, 1 1 3
skills, 19
Monitoring, 680
TCP/IP network protocol,
strategizing, 105
Morgan Stanley, 123, 309,
types of decisions, 34-35 Manufacturer' s Hanover Bank, 579 Marine Power Europe, 1 3 1 Market niche strategy, 108 Markets, electronic commerce, 3 1 5-321 Martin, James, 432 Matrix organizational structure, 139
472, 580
271-272 telecommunications, 259
Motorola, 184, 188
as transformational agents,
Mouse, 176, 426
285-287
Mrs. Fields Cookies, 86, 95, 96, 631, 634-635
transmission, 264 types of, 266
Multidimensional analysis, 247 Multimedia, 547, :582
Optical character recognition, 174
Multinational strategy, 130
Neuron, 614
Optical disk, 428, 506
Multiplexer, 267
New York Stock Exchange
Optimization model, 562
332, 680
Medtronic, Inc., 1 3 1
Multiprotocol rOUiler, 271
Nodes, 261, 271
Memory, 160
Multithreaded operation, 216
Nonprocedural languages, 472 Nonprograrnmed decisions,
cache, 167, 171
Multiuser design, 383
organization of, 163-164
Mutation, 619
virtual, 219-220
Mutual Benefit Life (MBL),
47-48
497-498
Memory manager, 221
Mutual dependence, 78
Memory size, 169
MVS (multiple virtual systems), 220
flexibility, defined, 78-79
Agreement (NAFTA), 128 Northern Telecom, 141 Northwest Airlines, 81 NUMI plant, 67
Metropolitan area network (MAN), 266
NASDAQ, 83, 248, 285, 324
NationsBank, 8, 60,
Meyers, Jack, 600
NATURAL, 472
Michelangelo virus, 642
NCR, 332
Micromarketing, 473
Negotiated agreement, 88
Microprograms, 167
Net browser, 306, 309-31 1
Microsoft, 122, 191, 206, 308, 354, 473
Net PCs, 185, 189, 308
533-535 interorganizational relations and, 541 motivation of, 537
See
Management control Object interaction diagram, 404-405
64
transformation, 105,
Organizational control.
National Computer Board
Foundation, 303
change program, 538-540 costsibenefits of, 535-537 implementing IT-based
Novell, 222
(Singapore), 584-585
495, 655
Organizational change
North America Free Trade
Mercedes Benz, 47, 92, 561
National Science
Options pricing model, 665
Oracle, 229; 245, 338, 370, 474,
Normalization, 238-240
Mergers, 537
(CMA), 106, 1 1 3
390, 5 1 9 Opportunity costs, 6 1
Multiprogramming, 219
process reengineering, 498-500
Operational status, 530 Operations management, 123,
zero-slot LAN, 269
MCI-Worldcom, 275
cash management account
637-640 outsourcing and, 661
Neural network, 595, 614-617
hypertext and, 588-590
(NYSE), 6 1 , 82-83,
Merrill Lynch, 58, 64, 90, 582
Windows NT, 222-223 Operational control, 30, 35, 48,
Opportunities, 1 1 7
Multiprocessing, 216
Memory technology, 163-165
221-223
uses of, 296
MCI, 58, 249
volatile, 163
multiprocessiug system, 216
Object program, 205 Object structure diagram, 404 Object-oriented analysis, 401 Object-oriented databases, 240-241 Object-oriented design, 246, 396, 401-405
Organizational culture, 143 Organizational design.
See also
Organizational structure conventional variables, 84-85
information technology and, 73, 84-86 interdependence and, 78 variables, 84-86 Organizational goals, 76
Net present value (NPV), 57, 665
example of, 460-469
alliances and, 141
Netscape, 141, 205, 214, 308
inheritance and, 402
Organizational issues, 73-74
cospecialized asset, 1 1 3
Network interface card
object interaction diagram,
Organizational knowledge,
operating system, 105, 198 Windows NT, 220, 222, 338
(NIC), 270 Network-centric computing, 337
404-405 object structure diagram, 404
groupware and, 572-580 Organizational risk, 470-471
728
INDEX
Organizational strategy
Outsourcing, 9, 38, 354, 488
desktop computing power, 335
Product evaluation, 364. Evaluation
See also
alliances, 121-122
IS development, 357,
device sharing, 269
corporate strategic plan and,
362-363 processing, 358
as major technological change, 188-189
Production automation, 85, 497,
pros and cons of, 362-363
network PC vs. low cost PC,
Productivity, 80
120-- 1 21 global strategy, 130 information technology
as strategy, 659-662
508, 5 1 3 Program trading, 82
189-190 networks and, 268-270,
Programmed decisions, 47-48 Programming environment,
multinational strategy, 130
333-334 operating systems for, 221-223
partnerships, 121-122
personal productivity and, 52
Programming languages,
and, 1 1 1
Over-the-counter (OTC)
international strategy, 130
transnational firms, 130
Organizational structure. See also
securities, 83, 285
Pacific Blue computer, 188 Packages, 212, 329-330,
T-form organizations
418-419
adaptive organization, 39
acquisition of, 481-482
bureaucratic organizations,
advantages of, 474-475
38, 84--8 5, 92
applications, 355
charismatic organization, 39
classification framework for,
control mechanisms, 86
477-479
coordination, 77-78
comparison of, 355
desigu variables and, 84
dedicated packages, 474,
division of labor, 76
478-479
software packages for, 329,
Project management, 642 Proprietary applications, 358
370--3 71 systems architecture and,
Proprietary databases, 359 Proprietary hardware, 184
332-333 techniques to increase speed,
Pro-Share, 87 Protocol, 265-266
171-172
Prototyping, 391, 484-485, 561
user independence, 332 Personal digital assistant (PDA), Personal stake, 524
as development tools,
PERSUADER, 6 1 8
example of, 487-488 how to develop, 485-486
52, 185, 190
design of, 472-473, 476
software for, 486 PTT (postal, telegraph and telephone) monopolies,
pfizer, 1 3 1
informal organization, 76
disadvantages of, 475-476
Phillips Petroleum, 568
informational technology
example of, 480-481
Pipelined computer, 172
implementing, 482-484
Pipelined execution, 170
strategy, 1 1 1 , 1 19-120
Programs, 197
(characteristics), 170
formal organization, 76
473-474
198-210
processor chips
flexibility and, 73-76 hierarchical organization, 92
197-198
integrating mechanisms, 77
information sources, 357
Piracy, 679
interdependence, 77-78
as IS alternatives, 415
Plan, 1 1 8
matrix organizations, 86, 139
PC software, 333
negotiated organization, 88-90
users' expectations and, 482
132-134, 136 Pulse code modulation (PCM), 264
Planning. See Organizational strategy
Quality, 16, 109 JIT aud, 100
maintaining, 90 as market-share strategy, 109
people and tasks, 92-93
Packet switching, 136, 275-276
Planning horizon, 121
reengineering design, 90
Pagers, 84
Plug and play, 172
Query language, 483
social organization, 76
Paging scheme, 220
Pointer, 233, 588
Queues, 216
specialization, 77
Palm pilot, 1 9 1
Pointing device, 426
uncertainty and, 77
Paradox, 229
Point-of-sale scanning equipment,
vertically integrated
Parallel computers, 188, 190
conglomerate, 9 1 Organizations changing, 90
Point-to-point protocol, 272
Radical change, 494
Partnerships, 53, 121-122
Polymorphism, 401
RAM.
Passenger name reservation
Pooled interdependence, 78
character of, 76-77
(PNR), 80
classifications, 38-39
control of, 1 1, 16-- 1 7. See also Management control
R/3, 479-48 1
106-107
Parity checking, 261
Passwords, 646 Pattern recognition, 595
(expert system), 610--6 1 3 Porter, Michael, 107-108
design of, 13-15, 93
PCI (Peripheral Component
flexibility in, 78-79, 90 influence on decision making, 38-39
PCM. See Pulse code modulation PDA.
See Personal digital assistant
Portfolio insurance, 83
RCA, 184 Read-only memory (ROM), 160
PowerBuilder, 212-213, 472
READOUT, 1 15
PowerPC, 188-190
Real-time system, 30, 57
PRECISION, 1 1 6
Reciprocal interdependence, 7 8 Record, 229
Peat Marwick, 578
Preliminary survey, 383
variables in, 84--86 new types of, 84--93
Pentium Chip, 1 70-- 1 72
Priceline.com, 385 Primary memory, 159-160.
people in, 91-93
1 74-- 175
politics in, 92
People Express, 80
socialization by, 28
PeopleSoft, 250, 370, 495, 655
structure of. See
Performance evaluation tool, 364
Organizational structure T-form organization.
See T-
form organization virtual, 93 OS/390, 220 Oticon, 17, 95-96 reengineering process, 508-5 12
Peripheral, 172 Perkin-Elmer, 88
also Random access memory
Reduced instruction set computer (RISC), 169, 188 Reengineering, 90 definition of, 493-496 implications of, 5 14 Mertill Lynch example,
1 63-165 organization of, 1 62-163 Privacy, 685-686, 690 Problem finding, 34-35
Personal communication systems
Problem solving.
(PCS), 274
See
memory technology and,
Perl, 2 1 0
Personal computers (PCs), 1 8 , 49, 52, 173
Rational decision making, 39
Power users, 552
information technology design
Pen-top personal computers,
Rapid application development (RAD), 432
Portability, 223
Pc.
Interconnect), 172
159-160
Port of Singapore Authority
Pay-as-Built, 67, 633
factors influencing, 77-78
Random access memory (RAM),
Pople, Harry, 600
defined, 76
See Personal computers
See Random access
memory
See Decision
making Problem-oriented language, 478 Process, definition of, 496-497
498-508 Mutual Benefit Life example, 497-498 Regimes of appropriability, 1 13 Register, 163 Relation, 236 Relational databases
applications, 333
Process manager, 221
advantages of, 235-236
Output, 1 1, 55
components, 158-160
Process owner, 497
example of, 236-237, 245
Output devices, 176-- 1 77
cost of, 184
Process reengineering, 86
CRT, 158
Processing transactions, 1 1 ,
inkjet printers, 176 laser printers, 176
customer order systems on, 10
voice output, 176--1 77
database systems for, 229
5 1-52 Prodigy, 298
normalization and, 238-240 Relational file, 235 Report Program Generator (RPG), 202
INDEX
Resource allocation life cycle requirements, 384-386
managers and, 384-386 Resources, 1 1 2-1 1 3
Semistructured decisions, 48
Software generations, 197
Synchronous mode, 261
Sequential files, 230, 232
Solectron, 9
Synopsys, 677
Sequential interdependence, 78
Source-data collection, 428
System-building tools, 551
Server centric, 245
SPA, 370
Systems analysis, 4, 1 1 , 380, 423
Servers, 185, 189-190, 222, 260,
Spaghetti organization, 95, 5 1 1
alternatives to, 41 8-420
Span of control, 84
analyzing existing system, 414
server architecture;
Specialists, 77
costlbenefits analysis,
Networks
Specialization, 77
335-337. See also Client-
Responsive organization, 534 Restructuring, 50 Return on capital, 65 Reuters Dealing System, 581 Right-sizing, 109 Ring or loop scheme, 268
RISC. See Reduced instruction set computer ROM.
See Read-only memory
Rosenbluth Travel, 105, 1 14-1 1 6
Internet, 274
Special-purpose languages, 210
in network, 268-270
Sperry, 184 SPI. See Standard Pharmaceuticals
Services industry, 358-359, 363 SET.
See Secure electronic
International
survey and feasibility study,
Simon, Herbert, 35, 47-48
Spreadsheets, 473, 478, 550
systems design life cycle,
Simplex transmission, 261 Single-user design, 383
Sprint, 275
Slade's decision making model,
SPSS (Statistkal Package for
Ryder Systems, 38
35-37
Smalltalk, 205 Social organization, 76
Sabre Decision Technologies, 365
Social responsibilities, 676-679 applications, 679-681
architecture of, 338-340, 346
complexity and integrity, 676
optimization model and, 562
defense and, 681
technology as competitive
education for technology,
advantage, 1 14-1 1 5 Travelocity and, 214 web opportunities and, 340-341
Safe computing, 646
as decision tool, 560
Social Sciences),
Smart card, 171
SABRE system, 57, 8 1 , 273, 679
design, 383 problems with, 391
Spiral model of systems development, 392-394
transmission
Rotational delay, 231
generator
416-418
defiuition of, 380-381 multi-user vs. single-user
Shell, 597
Router, 268
RPG. See Report program
729
681-684, 687
electronic secutities markets, 679-680
416-420 383-387
Systems design, 4, 122, 423-424, 690-691.
also Design task
2 1 0-2 1 1 , 478
acquisition/purchase
Language
backup, 430
SQL. See Structure Query Standard Pharmaceuticals International (SPI), 138-139 Standards, 338 ANSI X.12, 9 1 , 282, 285, 296-297 ANSI X.25 , 275
for electronic data interchange, 282
employee monitoring, 680
international, 132
employment, 685
networks, 271
decision, 355 client-server design, 425 compatison of approaches, 488-489
computer-aided software engineering, 430-431 conversion effectiveness and, 433 data collection for, 394-395, 428
developmental risks, 470-471
Sales-monitoring application, 344
impact of, 68 1-691
SQL as, 239-240
errors and, 428-429
Sandia National Laboratory, 188
piracy, 679
technical, ] 32
general considerations,
Santa Cruise Operations, Inc.
privacy, 685-686
(SCO), 222 SAP, 250, 338, 479-481 , 495, 655 Satellite, 272
reliability and failure, 678-679
Standish Group, 381
Steinfeld, Chades, 30 I Stock market, 83
secutity, 686-687
Stock option, 600
Scanners, 173-174
systems design, 690-691
Storage media, 230
Scenatios, 370
technology gap, 676-678, 684
Strategic alliances, 53, 354
Scripting languages, 210 Seagate, 231
Society for Information Management (SIM), 5 1 3
Strategic planning, 30-3 1 , 34, 48, 120-121
Search engine, 307-308
Soft-Ad Group, 589
Strategic resource, 1 13
Secondary storage, 160
Softbots, 307, 620
Secure electrouic transmission, 640
Software
Stratus, 430 Structure QuelY Language (SQL),
Securities and Exchange
applications software, 198
239-240
Commission (SEC),
assembly language, 1 98-199
Structured decisions, 48-49
499, 596
consultants, 357
Structured design, 396
Secutities industry, 679-680 Merrill Lynch example, 498-508
organizational flexibility and, 79 technology and, 82-83 Securities processing centers (SPCs), 499-508
Security, 642, 686-687
debugging and, 199, 217 defined, 197 development, 197 evaluating packages, 354, 368-370
data flow diagrams (DFD), 396-397
example of, 397-400 role of, 396 Structured information, 30
generations, 197
Subsidiaties, 130
higher-Ievel langnages,
Sununary information, 30
200-210
importance of, 196, 198
Sun Microsystems, 189, 205-206, 222, 308, 336-337, 354
bacteria, 645-646
influence on IS design, 329
Supercomputers, 185, 187-188
logic bomb, 644-645
internal vs. external
Superscalar architecture, 172
technical safeguards, 688-689 Trojan horse and, 642 virus, 643 worm, 645
sources, 361 managerial concerns and, 197-198
Supervisor, 216 Supply chain, 668 Support environment, 1 1 0
See
424-425
graphical user interfaces, 425-426
hardware and software guidelines, 347 internal vs. external sources, 359-361
management control and, 635-637
object-oriented design, 401-405
packages and, 479-480 potential problems, 520 processing decision, 357-358 prototyping, 484-485 purchase decisions and, 354 rapid application development (RAD), 432
services industry sources, 358-359
spiral model, 392-394 structured design, 396-400 structured vs. object-oriented design, 395-396, 406 user-oriented design, 391 web sites and, 426-428 Systems life cycle, 383-387 developmental risks and, 471-472
obsolescence and, 366
Support services, 553-554
Select clause, 239
packages.
Selection committee, 420-422 Semantic network, 597
programming languages, 198-199
Surprise infonnation, 30 Switched multimegabit data services (SMDS), 276
potential pitfaUs, 390-391 role of managers, users, and
Semiconductor technology, 163,
purchase, 354
Switched network, 266
spiral model of development,
169-171
See Packages
designers, 387-390 392-394
special purpose, 354
Switching costs, 1 14
CMOS, 349
systems software, 198
Sybase, 229
Systems problems, 520
operating systems for, 231-223
vendors, 222, 354
Synapse, 615
Systems software, 198, 478
730
INDEX
Users, 1 1 , 550. See also
n, 277, 283
Touch screens, 176
Tacit knowledge, 32-33
TradeNet, 61O
Taco Bell, 565
Training, 384
demographics, 524
Tandem, 332, 430
Transaction-cost economics, 320
expectations of, 482
Target stores, 473
Transactions processing, 5 1-52,
TCL, 21O TCPIIP. See Transmission Control
feedback from, 482
Walgreen's, 337 Walt Disney Studios, 586
transactions processing
programming by, 197-198,
Wanadoo, 302
Protocol (lP)
hardware for, 332
1 1 3-114 Technological leveling, 85, 97, 508, 5 1 2 Technological matrixing, 86, 97, 128, 512, 540
Technology. See also Information technology
Volvo, 275, 694
mainframes, 332
banking, 247
Technological leadership,
Volkswagen, 3 1 0
55, 344. See On-line
Protocol (TCP)IIntemet Technocratic utopianism, 651
Knowledge workers
Transactions sequence diagram, 404 Transborder data flows, 133 Transformational information technology, 64--65
203, 210-212, 259-260 role in IS design, 387-390 satisfaction, 364 support services, 553-554 system ownership, 525 USERVISION, 1 16 UUNET, 303-304
multiplexing (WDM), 278 WebTV, 588 Weight, 422, 616 Wells Fargo Bank, 314 What-if analyses, 560--5 61
Translator, 209
Data communication
development, 392-394 Wave-length division
Westinghouse, 537
Transistors per chip, 170 Transmission, 261-266. See also
Waterfall model of systems
Value, 65-66
Wheat First Union, 308
Value chain, 107-108
'Where clause, 239
competing with, 36
direction, 261-262
Value-added network (VAN), 283
Wide area network (WAN), 266
complexity and integrity, 676
modes, 261-263
Vangnard Group, 498
Windows NT, 220, 222, 338
evaluation of, 355-357
speed, 264-265, 271
Vanity Fair, 5 1
Windows operating system,
key technologies, 53
types of, 261-264
Vector technology, 188
major trends of, 17-19 outsourcing decision, 362-363 reliability and failure, 678--679 Technology gap, 684 Technology Revolution, 6-7 Technology-assisted meetings, 57 1-572 Technology-form organization.
See T-form organization
TELCOT, 285
Telecommunications Act of 1 996, 259
Transmission Control Protocol
Vendors, 363
(TCP)/Intemet Protocol
package design and, 476-477
(IP), 271-272, 303
package vendors, 367, 483
222-223 Windows98, 198, 221-223, 338, 478 WinWin spiral model, 393
Transmission modes, 261-263
VeriFone, 95, 96, 140-144
Wireless technology, 84, 272-274
Transmission speeds, 264-265,
Vertically integrated
Workstations, 14, 185, 1 89-190,
277-279 Transnational firms, 130, 144 Travelocity, 214, 340--342, 344 Trojan horse, 642 Turing, Alan, 595 Turnaround company, 1 10-- 1 1 1 Turner Broadcasting, 583, 586 Tyabji, Hatim, 140, 142, 143
Telecommuters, 91
conglomerate, 91 Very large scale integration (VLSI), 183 Video conferencing, 84, 86, 134, 5 8 1 Virtual applications processing workflow, 498 Virtual circuit, 278 Virtual components, 53, 84
Teleconferencing, 279
Virtual corporations, 84, 86,
347, 547 cost, 184 operating systems, 222-223 personal-computer-based, 344, 346 as servers, 337 World Merchandise Exchange (Womex), 137 World Wide Web (WWW), 18, 53, 57, 1 19, 209, 306
Teledesic, 272-273
Ubiquity, 301
Telephone network, 295
ULTRAVISION, 1 16
Virtual databases, 250
as data source, 34
Terminal, 173, 286
Uncertainty, 77
Virtual factory, 109
home pages, 1 17, 3 1 1 intranets and, 580
128, 144
browser standards and, 214
Termination, 530
UNISYS Corporation, 1 84, 354
Virtual inventory, 99
Testing, 384, 530
United Airlines, 8 1 , 1 13, 1 16, 297
Virtual manufacturing company, 9
as major change element, 18
T-form organizations, 13, 65, 86,
United HealthCare (UHC), 653
Virtual memory, 219
multimedia and, 583, 587
United Parcel Service, 1 13, 273,
Virtual negotiated-agreement
product and http software, 684
90, 5 1 9 adopting T-form design, 96-- 100 advantages of, 534 building a T-form, 94, 540 costlbenefits of, 534-537 examples of, 95-96
297, 428 Univac, 184 Universal product code (UPC), 107, 173 Universal resource locator (URLs), 307, 312, 588-589
organization, 88-89, 93 Virtual organization, 65, 87-88, 90, 93, 323 Virtual project teams, 143
security, 640 site design, 426-428, 550 strategy for, 16 web pages, 60--6 1
Virtual reality, 84, 683
Worm, 645
Virtual supplier, 97
WWW. See World Wide Web
management control and, 631
Unix, 210, 220, 222, 338
other designs, 94-96
Unstructured decisions, 48-49
VISION, 1 1 6, 1 1 9
people in the, 94
Upper CASE, 430
Visual Basic, 200, 210, 212, 473
X Windows, 337
URL. See Universal resource
VLSI. See Very large scale
X.12, 91, 282, 285, 296-297
3Com, 191 Time and space boundaries, 78 Time Warner, 583, 586, 655 Time-sharing, 200, 217-220 early era of, 217-219 evolutionary advances, 220--2 21 Token ring architecture, 271 Tools, 477 Top-down design, 396
locator U.S. Air, 340 US West, 583
Virus, 643
integration Voice communications systems, 274
USB (Universal Serial Bus), 172
Voice input, 175-176
Use case, 404
Voice mail, 95
User activities, 550-551
Voice output, 177
User interfaces, expert systems,
Voice over Internet Protocol
597. See also Graphical
user interfaces
X.25, 275 Xerox, 363, 662
(VoIP), 274 Voice recognition, 175
Yield management, 365
Zero-slot LAN, 269 Zeta Corporation, 532-533, 579